Jul 2 11:32:02.923007 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 11:32:02.923048 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 11:32:02.923068 kernel: BIOS-provided physical RAM map: Jul 2 11:32:02.923079 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 2 11:32:02.923088 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 2 11:32:02.923098 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 2 11:32:02.923109 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Jul 2 11:32:02.923119 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Jul 2 11:32:02.923129 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 2 11:32:02.923139 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jul 2 11:32:02.923152 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 2 11:32:02.923163 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 2 11:32:02.923172 kernel: NX (Execute Disable) protection: active Jul 2 11:32:02.923182 kernel: SMBIOS 2.8 present. Jul 2 11:32:02.923195 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Jul 2 11:32:02.923206 kernel: Hypervisor detected: KVM Jul 2 11:32:02.923228 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 11:32:02.923239 kernel: kvm-clock: cpu 0, msr 46192001, primary cpu clock Jul 2 11:32:02.923250 kernel: kvm-clock: using sched offset of 4828228478 cycles Jul 2 11:32:02.923274 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 11:32:02.923284 kernel: tsc: Detected 2499.998 MHz processor Jul 2 11:32:02.923295 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 11:32:02.923306 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 11:32:02.923328 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Jul 2 11:32:02.923339 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 11:32:02.923356 kernel: Using GB pages for direct mapping Jul 2 11:32:02.923366 kernel: ACPI: Early table checksum verification disabled Jul 2 11:32:02.923377 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Jul 2 11:32:02.923388 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 11:32:02.923399 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 11:32:02.923409 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 11:32:02.923420 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Jul 2 11:32:02.923431 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 11:32:02.923441 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 11:32:02.923456 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 11:32:02.923467 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 11:32:02.923478 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Jul 2 11:32:02.923489 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Jul 2 11:32:02.923499 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Jul 2 11:32:02.923510 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Jul 2 11:32:02.923527 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Jul 2 11:32:02.923542 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Jul 2 11:32:02.936582 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Jul 2 11:32:02.936595 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 11:32:02.936606 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 11:32:02.936617 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Jul 2 11:32:02.936627 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Jul 2 11:32:02.936638 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Jul 2 11:32:02.936655 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Jul 2 11:32:02.936666 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Jul 2 11:32:02.936677 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Jul 2 11:32:02.936699 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Jul 2 11:32:02.936709 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Jul 2 11:32:02.936729 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Jul 2 11:32:02.936754 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Jul 2 11:32:02.936765 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Jul 2 11:32:02.936776 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Jul 2 11:32:02.936788 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Jul 2 11:32:02.936804 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Jul 2 11:32:02.936816 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 2 11:32:02.936827 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Jul 2 11:32:02.936838 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Jul 2 11:32:02.936850 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Jul 2 11:32:02.936862 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Jul 2 11:32:02.936874 kernel: Zone ranges: Jul 2 11:32:02.936885 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 11:32:02.936897 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Jul 2 11:32:02.936912 kernel: Normal empty Jul 2 11:32:02.936924 kernel: Movable zone start for each node Jul 2 11:32:02.936935 kernel: Early memory node ranges Jul 2 11:32:02.936947 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 2 11:32:02.936958 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Jul 2 11:32:02.936969 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Jul 2 11:32:02.936981 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 11:32:02.936992 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 2 11:32:02.937003 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Jul 2 11:32:02.937019 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 2 11:32:02.937031 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 11:32:02.937042 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 11:32:02.937054 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 11:32:02.937065 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 11:32:02.937076 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 11:32:02.937088 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 11:32:02.937099 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 11:32:02.937111 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 11:32:02.937127 kernel: TSC deadline timer available Jul 2 11:32:02.937138 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Jul 2 11:32:02.937150 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jul 2 11:32:02.937161 kernel: Booting paravirtualized kernel on KVM Jul 2 11:32:02.937173 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 11:32:02.937184 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Jul 2 11:32:02.937196 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Jul 2 11:32:02.937207 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Jul 2 11:32:02.937219 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Jul 2 11:32:02.937234 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Jul 2 11:32:02.937245 kernel: kvm-guest: PV spinlocks enabled Jul 2 11:32:02.937257 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 11:32:02.937268 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Jul 2 11:32:02.937280 kernel: Policy zone: DMA32 Jul 2 11:32:02.937292 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 11:32:02.937305 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 11:32:02.937316 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 11:32:02.937332 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 11:32:02.937343 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 11:32:02.937355 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 192524K reserved, 0K cma-reserved) Jul 2 11:32:02.937378 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Jul 2 11:32:02.937389 kernel: Kernel/User page tables isolation: enabled Jul 2 11:32:02.937401 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 11:32:02.937411 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 11:32:02.937435 kernel: rcu: Hierarchical RCU implementation. Jul 2 11:32:02.937446 kernel: rcu: RCU event tracing is enabled. Jul 2 11:32:02.937461 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Jul 2 11:32:02.937471 kernel: Rude variant of Tasks RCU enabled. Jul 2 11:32:02.937482 kernel: Tracing variant of Tasks RCU enabled. Jul 2 11:32:02.937492 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 11:32:02.937503 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Jul 2 11:32:02.937513 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Jul 2 11:32:02.937524 kernel: random: crng init done Jul 2 11:32:02.937546 kernel: Console: colour VGA+ 80x25 Jul 2 11:32:02.937578 kernel: printk: console [tty0] enabled Jul 2 11:32:02.937591 kernel: printk: console [ttyS0] enabled Jul 2 11:32:02.937602 kernel: ACPI: Core revision 20210730 Jul 2 11:32:02.937613 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 11:32:02.937628 kernel: x2apic enabled Jul 2 11:32:02.937639 kernel: Switched APIC routing to physical x2apic. Jul 2 11:32:02.937651 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Jul 2 11:32:02.937674 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Jul 2 11:32:02.937685 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 2 11:32:02.937701 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Jul 2 11:32:02.937712 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Jul 2 11:32:02.937746 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 11:32:02.937759 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 11:32:02.937770 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 11:32:02.937783 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 11:32:02.937794 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Jul 2 11:32:02.937806 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 11:32:02.937818 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 11:32:02.937830 kernel: MDS: Mitigation: Clear CPU buffers Jul 2 11:32:02.937842 kernel: MMIO Stale Data: Unknown: No mitigations Jul 2 11:32:02.937859 kernel: SRBDS: Unknown: Dependent on hypervisor status Jul 2 11:32:02.937871 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 11:32:02.937883 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 11:32:02.937895 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 11:32:02.937907 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 11:32:02.937919 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 11:32:02.937931 kernel: Freeing SMP alternatives memory: 32K Jul 2 11:32:02.937943 kernel: pid_max: default: 32768 minimum: 301 Jul 2 11:32:02.937955 kernel: LSM: Security Framework initializing Jul 2 11:32:02.937966 kernel: SELinux: Initializing. Jul 2 11:32:02.937978 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 11:32:02.937995 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 11:32:02.938007 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Jul 2 11:32:02.938019 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Jul 2 11:32:02.938031 kernel: signal: max sigframe size: 1776 Jul 2 11:32:02.938043 kernel: rcu: Hierarchical SRCU implementation. Jul 2 11:32:02.938055 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 11:32:02.938067 kernel: smp: Bringing up secondary CPUs ... Jul 2 11:32:02.938079 kernel: x86: Booting SMP configuration: Jul 2 11:32:02.938091 kernel: .... node #0, CPUs: #1 Jul 2 11:32:02.938107 kernel: kvm-clock: cpu 1, msr 46192041, secondary cpu clock Jul 2 11:32:02.938120 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Jul 2 11:32:02.938132 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Jul 2 11:32:02.938144 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 11:32:02.938156 kernel: smpboot: Max logical packages: 16 Jul 2 11:32:02.938168 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Jul 2 11:32:02.938180 kernel: devtmpfs: initialized Jul 2 11:32:02.938192 kernel: x86/mm: Memory block size: 128MB Jul 2 11:32:02.938204 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 11:32:02.938216 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Jul 2 11:32:02.938233 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 11:32:02.938245 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 11:32:02.938257 kernel: audit: initializing netlink subsys (disabled) Jul 2 11:32:02.938269 kernel: audit: type=2000 audit(1719919921.857:1): state=initialized audit_enabled=0 res=1 Jul 2 11:32:02.938281 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 11:32:02.938293 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 11:32:02.938305 kernel: cpuidle: using governor menu Jul 2 11:32:02.938317 kernel: ACPI: bus type PCI registered Jul 2 11:32:02.938329 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 11:32:02.938346 kernel: dca service started, version 1.12.1 Jul 2 11:32:02.938358 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 2 11:32:02.938370 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 2 11:32:02.938382 kernel: PCI: Using configuration type 1 for base access Jul 2 11:32:02.938394 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 11:32:02.938406 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 11:32:02.938418 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 11:32:02.938430 kernel: ACPI: Added _OSI(Module Device) Jul 2 11:32:02.938446 kernel: ACPI: Added _OSI(Processor Device) Jul 2 11:32:02.938458 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 11:32:02.938470 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 11:32:02.938482 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 11:32:02.938495 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 11:32:02.938507 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 11:32:02.938519 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 11:32:02.938541 kernel: ACPI: Interpreter enabled Jul 2 11:32:02.938555 kernel: ACPI: PM: (supports S0 S5) Jul 2 11:32:02.938567 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 11:32:02.938584 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 11:32:02.938597 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 2 11:32:02.938609 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 11:32:02.938861 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 11:32:02.939037 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 2 11:32:02.939206 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 2 11:32:02.939224 kernel: PCI host bridge to bus 0000:00 Jul 2 11:32:02.939398 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 11:32:02.942490 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 11:32:02.942681 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 11:32:02.942850 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Jul 2 11:32:02.943009 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 2 11:32:02.943154 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Jul 2 11:32:02.943305 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 11:32:02.943487 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 2 11:32:02.943728 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Jul 2 11:32:02.943894 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Jul 2 11:32:02.944051 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Jul 2 11:32:02.944205 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Jul 2 11:32:02.944360 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 11:32:02.944550 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Jul 2 11:32:02.944749 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Jul 2 11:32:02.944925 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Jul 2 11:32:02.945104 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Jul 2 11:32:02.945304 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Jul 2 11:32:02.945465 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Jul 2 11:32:02.945669 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Jul 2 11:32:02.945873 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Jul 2 11:32:02.946042 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Jul 2 11:32:02.946208 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Jul 2 11:32:02.946386 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Jul 2 11:32:02.946545 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Jul 2 11:32:02.958795 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Jul 2 11:32:02.958961 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Jul 2 11:32:02.959142 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Jul 2 11:32:02.959296 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Jul 2 11:32:02.959442 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jul 2 11:32:02.959645 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Jul 2 11:32:02.959830 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Jul 2 11:32:02.959994 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Jul 2 11:32:02.960159 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Jul 2 11:32:02.960337 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jul 2 11:32:02.960515 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jul 2 11:32:02.960735 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Jul 2 11:32:02.960894 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Jul 2 11:32:02.961085 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 2 11:32:02.961252 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 2 11:32:02.961418 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 2 11:32:02.961617 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Jul 2 11:32:02.961810 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Jul 2 11:32:02.961979 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 2 11:32:02.962163 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jul 2 11:32:02.962344 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Jul 2 11:32:02.962502 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Jul 2 11:32:02.970667 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Jul 2 11:32:02.970871 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Jul 2 11:32:02.971033 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Jul 2 11:32:02.971206 kernel: pci_bus 0000:02: extended config space not accessible Jul 2 11:32:02.971412 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Jul 2 11:32:02.975641 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Jul 2 11:32:02.975839 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Jul 2 11:32:02.976009 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Jul 2 11:32:02.976185 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Jul 2 11:32:02.976351 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Jul 2 11:32:02.976512 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Jul 2 11:32:02.976696 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Jul 2 11:32:02.976869 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 2 11:32:02.977070 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Jul 2 11:32:02.977240 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Jul 2 11:32:02.977405 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Jul 2 11:32:02.977579 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Jul 2 11:32:02.977753 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 2 11:32:02.977912 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Jul 2 11:32:02.978077 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Jul 2 11:32:02.978233 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 2 11:32:02.978395 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Jul 2 11:32:02.978566 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Jul 2 11:32:02.978735 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 2 11:32:02.978897 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Jul 2 11:32:02.979071 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Jul 2 11:32:02.979241 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 2 11:32:02.979408 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Jul 2 11:32:02.983630 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Jul 2 11:32:02.983855 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 2 11:32:02.984024 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Jul 2 11:32:02.984192 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Jul 2 11:32:02.984367 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 2 11:32:02.984386 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 11:32:02.984400 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 11:32:02.984427 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 11:32:02.984440 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 11:32:02.984452 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 2 11:32:02.984472 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 2 11:32:02.984485 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 2 11:32:02.984497 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 2 11:32:02.984509 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 2 11:32:02.984521 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 2 11:32:02.984546 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 2 11:32:02.984577 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 2 11:32:02.984590 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 2 11:32:02.984602 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 2 11:32:02.984613 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 2 11:32:02.984625 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 2 11:32:02.984649 kernel: iommu: Default domain type: Translated Jul 2 11:32:02.984661 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 11:32:02.984858 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 2 11:32:02.985020 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 11:32:02.985198 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 2 11:32:02.985228 kernel: vgaarb: loaded Jul 2 11:32:02.985240 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 11:32:02.985251 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 11:32:02.985276 kernel: PTP clock support registered Jul 2 11:32:02.985288 kernel: PCI: Using ACPI for IRQ routing Jul 2 11:32:02.985300 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 11:32:02.985312 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 2 11:32:02.985331 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Jul 2 11:32:02.985343 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 11:32:02.985356 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 11:32:02.985368 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 11:32:02.985380 kernel: pnp: PnP ACPI init Jul 2 11:32:02.985579 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 2 11:32:02.985600 kernel: pnp: PnP ACPI: found 5 devices Jul 2 11:32:02.985630 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 11:32:02.985648 kernel: NET: Registered PF_INET protocol family Jul 2 11:32:02.985661 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 11:32:02.985686 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 2 11:32:02.985697 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 11:32:02.985709 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 11:32:02.985731 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 11:32:02.985756 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 2 11:32:02.985769 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 11:32:02.985781 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 11:32:02.985798 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 11:32:02.985811 kernel: NET: Registered PF_XDP protocol family Jul 2 11:32:02.985972 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Jul 2 11:32:02.986158 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Jul 2 11:32:02.986337 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Jul 2 11:32:02.986497 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Jul 2 11:32:02.986673 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Jul 2 11:32:02.986855 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Jul 2 11:32:02.987016 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Jul 2 11:32:02.987194 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Jul 2 11:32:02.987366 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Jul 2 11:32:02.987522 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Jul 2 11:32:02.996634 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Jul 2 11:32:02.996847 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Jul 2 11:32:02.997027 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Jul 2 11:32:02.997190 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Jul 2 11:32:02.997348 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Jul 2 11:32:02.997517 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Jul 2 11:32:02.997733 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Jul 2 11:32:02.997906 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Jul 2 11:32:02.998064 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Jul 2 11:32:02.998239 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Jul 2 11:32:02.998412 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Jul 2 11:32:02.998611 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Jul 2 11:32:02.998813 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Jul 2 11:32:02.998977 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Jul 2 11:32:02.999137 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Jul 2 11:32:02.999301 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 2 11:32:02.999459 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Jul 2 11:32:02.999655 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Jul 2 11:32:02.999842 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Jul 2 11:32:03.000004 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 2 11:32:03.000164 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Jul 2 11:32:03.000332 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Jul 2 11:32:03.000497 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Jul 2 11:32:03.000681 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 2 11:32:03.000854 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Jul 2 11:32:03.001023 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Jul 2 11:32:03.001184 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Jul 2 11:32:03.001347 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 2 11:32:03.001529 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Jul 2 11:32:03.001697 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Jul 2 11:32:03.001880 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Jul 2 11:32:03.002041 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 2 11:32:03.002198 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Jul 2 11:32:03.002379 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Jul 2 11:32:03.002560 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Jul 2 11:32:03.002738 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 2 11:32:03.002900 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Jul 2 11:32:03.003061 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Jul 2 11:32:03.003228 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Jul 2 11:32:03.003401 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 2 11:32:03.003576 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 11:32:03.003741 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 11:32:03.003891 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 11:32:03.004037 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Jul 2 11:32:03.004183 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 2 11:32:03.004327 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Jul 2 11:32:03.004502 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Jul 2 11:32:03.004734 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Jul 2 11:32:03.004895 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Jul 2 11:32:03.005072 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Jul 2 11:32:03.005255 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Jul 2 11:32:03.005404 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Jul 2 11:32:03.005580 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 2 11:32:03.005780 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Jul 2 11:32:03.005938 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Jul 2 11:32:03.006091 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 2 11:32:03.006282 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Jul 2 11:32:03.006465 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Jul 2 11:32:03.006640 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 2 11:32:03.006847 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Jul 2 11:32:03.007011 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Jul 2 11:32:03.007161 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 2 11:32:03.007336 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Jul 2 11:32:03.007493 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Jul 2 11:32:03.013985 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 2 11:32:03.014179 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Jul 2 11:32:03.014381 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Jul 2 11:32:03.014580 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 2 11:32:03.014789 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Jul 2 11:32:03.014943 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Jul 2 11:32:03.015105 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 2 11:32:03.015125 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 2 11:32:03.015139 kernel: PCI: CLS 0 bytes, default 64 Jul 2 11:32:03.015153 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 11:32:03.015173 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Jul 2 11:32:03.015186 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 11:32:03.015200 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Jul 2 11:32:03.015213 kernel: Initialise system trusted keyrings Jul 2 11:32:03.015226 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 2 11:32:03.015239 kernel: Key type asymmetric registered Jul 2 11:32:03.015252 kernel: Asymmetric key parser 'x509' registered Jul 2 11:32:03.015264 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 11:32:03.015277 kernel: io scheduler mq-deadline registered Jul 2 11:32:03.015294 kernel: io scheduler kyber registered Jul 2 11:32:03.015308 kernel: io scheduler bfq registered Jul 2 11:32:03.015499 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Jul 2 11:32:03.015683 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Jul 2 11:32:03.015865 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 2 11:32:03.016036 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Jul 2 11:32:03.016205 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Jul 2 11:32:03.016406 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 2 11:32:03.016585 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Jul 2 11:32:03.016774 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Jul 2 11:32:03.016944 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 2 11:32:03.017114 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Jul 2 11:32:03.017282 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Jul 2 11:32:03.017494 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 2 11:32:03.017666 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Jul 2 11:32:03.017856 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Jul 2 11:32:03.018014 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 2 11:32:03.030110 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Jul 2 11:32:03.030292 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Jul 2 11:32:03.030472 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 2 11:32:03.030661 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Jul 2 11:32:03.030845 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Jul 2 11:32:03.031024 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 2 11:32:03.031199 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Jul 2 11:32:03.031370 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Jul 2 11:32:03.031568 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 2 11:32:03.031590 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 11:32:03.031604 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 2 11:32:03.031627 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 2 11:32:03.031640 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 11:32:03.031653 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 11:32:03.031666 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 11:32:03.031679 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 11:32:03.031699 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 11:32:03.031881 kernel: rtc_cmos 00:03: RTC can wake from S4 Jul 2 11:32:03.031903 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 11:32:03.032070 kernel: rtc_cmos 00:03: registered as rtc0 Jul 2 11:32:03.032245 kernel: rtc_cmos 00:03: setting system clock to 2024-07-02T11:32:02 UTC (1719919922) Jul 2 11:32:03.032416 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Jul 2 11:32:03.032436 kernel: intel_pstate: CPU model not supported Jul 2 11:32:03.032455 kernel: NET: Registered PF_INET6 protocol family Jul 2 11:32:03.032469 kernel: Segment Routing with IPv6 Jul 2 11:32:03.032482 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 11:32:03.032495 kernel: NET: Registered PF_PACKET protocol family Jul 2 11:32:03.032508 kernel: Key type dns_resolver registered Jul 2 11:32:03.040567 kernel: IPI shorthand broadcast: enabled Jul 2 11:32:03.040590 kernel: sched_clock: Marking stable (999805725, 225313694)->(1515027785, -289908366) Jul 2 11:32:03.040605 kernel: registered taskstats version 1 Jul 2 11:32:03.040618 kernel: Loading compiled-in X.509 certificates Jul 2 11:32:03.040631 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 11:32:03.040652 kernel: Key type .fscrypt registered Jul 2 11:32:03.040665 kernel: Key type fscrypt-provisioning registered Jul 2 11:32:03.040678 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 11:32:03.040691 kernel: ima: Allocated hash algorithm: sha1 Jul 2 11:32:03.040704 kernel: ima: No architecture policies found Jul 2 11:32:03.040729 kernel: clk: Disabling unused clocks Jul 2 11:32:03.040743 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 11:32:03.040756 kernel: Write protecting the kernel read-only data: 28672k Jul 2 11:32:03.040775 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 11:32:03.040794 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 11:32:03.040807 kernel: Run /init as init process Jul 2 11:32:03.040820 kernel: with arguments: Jul 2 11:32:03.040833 kernel: /init Jul 2 11:32:03.040845 kernel: with environment: Jul 2 11:32:03.040858 kernel: HOME=/ Jul 2 11:32:03.040870 kernel: TERM=linux Jul 2 11:32:03.040882 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 11:32:03.040905 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 11:32:03.040928 systemd[1]: Detected virtualization kvm. Jul 2 11:32:03.040942 systemd[1]: Detected architecture x86-64. Jul 2 11:32:03.040956 systemd[1]: Running in initrd. Jul 2 11:32:03.040970 systemd[1]: No hostname configured, using default hostname. Jul 2 11:32:03.040996 systemd[1]: Hostname set to . Jul 2 11:32:03.041009 systemd[1]: Initializing machine ID from VM UUID. Jul 2 11:32:03.041027 systemd[1]: Queued start job for default target initrd.target. Jul 2 11:32:03.041040 systemd[1]: Started systemd-ask-password-console.path. Jul 2 11:32:03.041065 systemd[1]: Reached target cryptsetup.target. Jul 2 11:32:03.041078 systemd[1]: Reached target paths.target. Jul 2 11:32:03.041090 systemd[1]: Reached target slices.target. Jul 2 11:32:03.041107 systemd[1]: Reached target swap.target. Jul 2 11:32:03.041119 systemd[1]: Reached target timers.target. Jul 2 11:32:03.041133 systemd[1]: Listening on iscsid.socket. Jul 2 11:32:03.041171 systemd[1]: Listening on iscsiuio.socket. Jul 2 11:32:03.041185 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 11:32:03.041202 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 11:32:03.041235 systemd[1]: Listening on systemd-journald.socket. Jul 2 11:32:03.041249 systemd[1]: Listening on systemd-networkd.socket. Jul 2 11:32:03.041263 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 11:32:03.041276 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 11:32:03.041290 systemd[1]: Reached target sockets.target. Jul 2 11:32:03.041316 systemd[1]: Starting kmod-static-nodes.service... Jul 2 11:32:03.041333 systemd[1]: Finished network-cleanup.service. Jul 2 11:32:03.041346 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 11:32:03.041372 systemd[1]: Starting systemd-journald.service... Jul 2 11:32:03.041386 systemd[1]: Starting systemd-modules-load.service... Jul 2 11:32:03.041399 systemd[1]: Starting systemd-resolved.service... Jul 2 11:32:03.041413 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 11:32:03.041427 systemd[1]: Finished kmod-static-nodes.service. Jul 2 11:32:03.041441 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 11:32:03.041454 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 11:32:03.041472 systemd[1]: Started systemd-resolved.service. Jul 2 11:32:03.041486 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 11:32:03.041500 kernel: audit: type=1130 audit(1719919923.017:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.041514 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 11:32:03.041528 kernel: audit: type=1130 audit(1719919923.024:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.041541 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 11:32:03.041555 systemd[1]: Reached target nss-lookup.target. Jul 2 11:32:03.041569 kernel: audit: type=1130 audit(1719919923.031:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.041586 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 11:32:03.041631 systemd-journald[202]: Journal started Jul 2 11:32:03.041713 systemd-journald[202]: Runtime Journal (/run/log/journal/80e33e3d7e6d4377a128b042c3be0a18) is 4.7M, max 38.1M, 33.3M free. Jul 2 11:32:03.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:02.928839 systemd-modules-load[203]: Inserted module 'overlay' Jul 2 11:32:02.946606 systemd-resolved[204]: Positive Trust Anchors: Jul 2 11:32:03.047265 systemd[1]: Started systemd-journald.service. Jul 2 11:32:03.047292 kernel: Bridge firewalling registered Jul 2 11:32:02.946623 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 11:32:03.056993 kernel: audit: type=1130 audit(1719919923.050:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:02.946669 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 11:32:02.950760 systemd-resolved[204]: Defaulting to hostname 'linux'. Jul 2 11:32:03.047554 systemd-modules-load[203]: Inserted module 'br_netfilter' Jul 2 11:32:03.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.071976 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 11:32:03.079261 kernel: audit: type=1130 audit(1719919923.072:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.073958 systemd[1]: Starting dracut-cmdline.service... Jul 2 11:32:03.085354 kernel: SCSI subsystem initialized Jul 2 11:32:03.093583 dracut-cmdline[218]: dracut-dracut-053 Jul 2 11:32:03.093583 dracut-cmdline[218]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 11:32:03.103673 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 11:32:03.103731 kernel: device-mapper: uevent: version 1.0.3 Jul 2 11:32:03.105987 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 11:32:03.110161 systemd-modules-load[203]: Inserted module 'dm_multipath' Jul 2 11:32:03.111468 systemd[1]: Finished systemd-modules-load.service. Jul 2 11:32:03.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.113128 systemd[1]: Starting systemd-sysctl.service... Jul 2 11:32:03.121646 kernel: audit: type=1130 audit(1719919923.111:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.128600 systemd[1]: Finished systemd-sysctl.service. Jul 2 11:32:03.149598 kernel: audit: type=1130 audit(1719919923.129:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.201577 kernel: Loading iSCSI transport class v2.0-870. Jul 2 11:32:03.223559 kernel: iscsi: registered transport (tcp) Jul 2 11:32:03.253051 kernel: iscsi: registered transport (qla4xxx) Jul 2 11:32:03.253105 kernel: QLogic iSCSI HBA Driver Jul 2 11:32:03.301230 systemd[1]: Finished dracut-cmdline.service. Jul 2 11:32:03.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.308556 kernel: audit: type=1130 audit(1719919923.301:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.307752 systemd[1]: Starting dracut-pre-udev.service... Jul 2 11:32:03.366672 kernel: raid6: sse2x4 gen() 13340 MB/s Jul 2 11:32:03.384622 kernel: raid6: sse2x4 xor() 7860 MB/s Jul 2 11:32:03.402578 kernel: raid6: sse2x2 gen() 9572 MB/s Jul 2 11:32:03.420640 kernel: raid6: sse2x2 xor() 7831 MB/s Jul 2 11:32:03.438646 kernel: raid6: sse2x1 gen() 9745 MB/s Jul 2 11:32:03.457177 kernel: raid6: sse2x1 xor() 6844 MB/s Jul 2 11:32:03.457213 kernel: raid6: using algorithm sse2x4 gen() 13340 MB/s Jul 2 11:32:03.457231 kernel: raid6: .... xor() 7860 MB/s, rmw enabled Jul 2 11:32:03.458512 kernel: raid6: using ssse3x2 recovery algorithm Jul 2 11:32:03.476645 kernel: xor: automatically using best checksumming function avx Jul 2 11:32:03.599619 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 11:32:03.615374 systemd[1]: Finished dracut-pre-udev.service. Jul 2 11:32:03.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.622565 kernel: audit: type=1130 audit(1719919923.615:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.616000 audit: BPF prog-id=7 op=LOAD Jul 2 11:32:03.616000 audit: BPF prog-id=8 op=LOAD Jul 2 11:32:03.621825 systemd[1]: Starting systemd-udevd.service... Jul 2 11:32:03.639938 systemd-udevd[401]: Using default interface naming scheme 'v252'. Jul 2 11:32:03.648075 systemd[1]: Started systemd-udevd.service. Jul 2 11:32:03.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.652791 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 11:32:03.671381 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Jul 2 11:32:03.714571 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 11:32:03.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.716454 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 11:32:03.811250 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 11:32:03.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:03.917547 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Jul 2 11:32:03.932564 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 11:32:03.953943 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 11:32:03.953982 kernel: GPT:17805311 != 125829119 Jul 2 11:32:03.954002 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 11:32:03.954019 kernel: GPT:17805311 != 125829119 Jul 2 11:32:03.954052 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 11:32:03.954071 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 11:32:03.962568 kernel: ACPI: bus type USB registered Jul 2 11:32:03.962615 kernel: usbcore: registered new interface driver usbfs Jul 2 11:32:03.974702 kernel: AVX version of gcm_enc/dec engaged. Jul 2 11:32:03.974740 kernel: usbcore: registered new interface driver hub Jul 2 11:32:03.980557 kernel: usbcore: registered new device driver usb Jul 2 11:32:03.980602 kernel: AES CTR mode by8 optimization enabled Jul 2 11:32:04.008550 kernel: libata version 3.00 loaded. Jul 2 11:32:04.019548 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (458) Jul 2 11:32:04.030271 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 11:32:04.131029 kernel: ahci 0000:00:1f.2: version 3.0 Jul 2 11:32:04.131334 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 2 11:32:04.131370 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 2 11:32:04.131594 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 2 11:32:04.131798 kernel: scsi host0: ahci Jul 2 11:32:04.132037 kernel: scsi host1: ahci Jul 2 11:32:04.132248 kernel: scsi host2: ahci Jul 2 11:32:04.132477 kernel: scsi host3: ahci Jul 2 11:32:04.132734 kernel: scsi host4: ahci Jul 2 11:32:04.132940 kernel: scsi host5: ahci Jul 2 11:32:04.133168 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Jul 2 11:32:04.133188 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Jul 2 11:32:04.133206 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Jul 2 11:32:04.133223 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Jul 2 11:32:04.133240 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Jul 2 11:32:04.133257 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Jul 2 11:32:04.133275 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Jul 2 11:32:04.133466 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Jul 2 11:32:04.133699 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Jul 2 11:32:04.133883 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Jul 2 11:32:04.134084 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Jul 2 11:32:04.134261 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Jul 2 11:32:04.134438 kernel: hub 1-0:1.0: USB hub found Jul 2 11:32:04.134753 kernel: hub 1-0:1.0: 4 ports detected Jul 2 11:32:04.134973 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Jul 2 11:32:04.135206 kernel: hub 2-0:1.0: USB hub found Jul 2 11:32:04.135414 kernel: hub 2-0:1.0: 4 ports detected Jul 2 11:32:04.129557 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 11:32:04.136503 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 11:32:04.142781 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 11:32:04.155645 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 11:32:04.157737 systemd[1]: Starting disk-uuid.service... Jul 2 11:32:04.165382 disk-uuid[529]: Primary Header is updated. Jul 2 11:32:04.165382 disk-uuid[529]: Secondary Entries is updated. Jul 2 11:32:04.165382 disk-uuid[529]: Secondary Header is updated. Jul 2 11:32:04.168860 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 11:32:04.301583 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Jul 2 11:32:04.371409 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 2 11:32:04.371484 kernel: ata3: SATA link down (SStatus 0 SControl 300) Jul 2 11:32:04.374974 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 2 11:32:04.375014 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 2 11:32:04.376599 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 2 11:32:04.378286 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 2 11:32:04.445564 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 11:32:04.453104 kernel: usbcore: registered new interface driver usbhid Jul 2 11:32:04.453158 kernel: usbhid: USB HID core driver Jul 2 11:32:04.462295 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Jul 2 11:32:04.462343 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Jul 2 11:32:05.192592 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 11:32:05.193224 disk-uuid[530]: The operation has completed successfully. Jul 2 11:32:05.252672 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 11:32:05.253876 systemd[1]: Finished disk-uuid.service. Jul 2 11:32:05.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.256328 systemd[1]: Starting verity-setup.service... Jul 2 11:32:05.279560 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Jul 2 11:32:05.331178 systemd[1]: Found device dev-mapper-usr.device. Jul 2 11:32:05.332785 systemd[1]: Mounting sysusr-usr.mount... Jul 2 11:32:05.334935 systemd[1]: Finished verity-setup.service. Jul 2 11:32:05.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.426559 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 11:32:05.427534 systemd[1]: Mounted sysusr-usr.mount. Jul 2 11:32:05.428349 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 11:32:05.429361 systemd[1]: Starting ignition-setup.service... Jul 2 11:32:05.432132 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 11:32:05.450568 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 11:32:05.450619 kernel: BTRFS info (device vda6): using free space tree Jul 2 11:32:05.450650 kernel: BTRFS info (device vda6): has skinny extents Jul 2 11:32:05.466758 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 11:32:05.479741 systemd[1]: Finished ignition-setup.service. Jul 2 11:32:05.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.481479 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 11:32:05.596726 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 11:32:05.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.598000 audit: BPF prog-id=9 op=LOAD Jul 2 11:32:05.600119 systemd[1]: Starting systemd-networkd.service... Jul 2 11:32:05.650297 systemd-networkd[712]: lo: Link UP Jul 2 11:32:05.650310 systemd-networkd[712]: lo: Gained carrier Jul 2 11:32:05.651279 systemd-networkd[712]: Enumeration completed Jul 2 11:32:05.651689 systemd-networkd[712]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 11:32:05.653339 systemd-networkd[712]: eth0: Link UP Jul 2 11:32:05.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.655209 ignition[629]: Ignition 2.14.0 Jul 2 11:32:05.653346 systemd-networkd[712]: eth0: Gained carrier Jul 2 11:32:05.655231 ignition[629]: Stage: fetch-offline Jul 2 11:32:05.654422 systemd[1]: Started systemd-networkd.service. Jul 2 11:32:05.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.655343 ignition[629]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:32:05.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.657502 systemd[1]: Reached target network.target. Jul 2 11:32:05.655381 ignition[629]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 11:32:05.661380 systemd[1]: Starting iscsiuio.service... Jul 2 11:32:05.661648 ignition[629]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 11:32:05.679209 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 11:32:05.662168 ignition[629]: parsed url from cmdline: "" Jul 2 11:32:05.680311 systemd[1]: Started iscsiuio.service. Jul 2 11:32:05.662180 ignition[629]: no config URL provided Jul 2 11:32:05.682666 systemd[1]: Starting ignition-fetch.service... Jul 2 11:32:05.662217 ignition[629]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 11:32:05.662243 ignition[629]: no config at "/usr/lib/ignition/user.ign" Jul 2 11:32:05.662284 ignition[629]: failed to fetch config: resource requires networking Jul 2 11:32:05.662818 ignition[629]: Ignition finished successfully Jul 2 11:32:05.692696 systemd[1]: Starting iscsid.service... Jul 2 11:32:05.698075 ignition[717]: Ignition 2.14.0 Jul 2 11:32:05.701427 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 11:32:05.701427 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 11:32:05.701427 iscsid[722]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 11:32:05.701427 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 11:32:05.701427 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 11:32:05.701427 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 11:32:05.701427 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 11:32:05.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.698091 ignition[717]: Stage: fetch Jul 2 11:32:05.703832 systemd[1]: Started iscsid.service. Jul 2 11:32:05.698270 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:32:05.706764 systemd[1]: Starting dracut-initqueue.service... Jul 2 11:32:05.698319 ignition[717]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 11:32:05.712686 systemd-networkd[712]: eth0: DHCPv4 address 10.230.62.206/30, gateway 10.230.62.205 acquired from 10.230.62.205 Jul 2 11:32:05.699776 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 11:32:05.699900 ignition[717]: parsed url from cmdline: "" Jul 2 11:32:05.699907 ignition[717]: no config URL provided Jul 2 11:32:05.699917 ignition[717]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 11:32:05.699933 ignition[717]: no config at "/usr/lib/ignition/user.ign" Jul 2 11:32:05.702417 ignition[717]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Jul 2 11:32:05.702455 ignition[717]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Jul 2 11:32:05.704641 ignition[717]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Jul 2 11:32:05.726045 systemd[1]: Finished dracut-initqueue.service. Jul 2 11:32:05.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.726916 systemd[1]: Reached target remote-fs-pre.target. Jul 2 11:32:05.728053 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 11:32:05.729342 systemd[1]: Reached target remote-fs.target. Jul 2 11:32:05.731671 ignition[717]: GET result: OK Jul 2 11:32:05.731819 ignition[717]: parsing config with SHA512: acb2ef0a7b9c93e0e77d18768b9048f499cba63fa292c1dc9c6e5a9d239a5cde6b7fccfcb328db10f4bc4d8861b5c9d20a9d6835e2a23c8309dc1e4bb819e94f Jul 2 11:32:05.732940 systemd[1]: Starting dracut-pre-mount.service... Jul 2 11:32:05.745408 systemd[1]: Finished dracut-pre-mount.service. Jul 2 11:32:05.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.749176 unknown[717]: fetched base config from "system" Jul 2 11:32:05.749789 ignition[717]: fetch: fetch complete Jul 2 11:32:05.749192 unknown[717]: fetched base config from "system" Jul 2 11:32:05.749798 ignition[717]: fetch: fetch passed Jul 2 11:32:05.749202 unknown[717]: fetched user config from "openstack" Jul 2 11:32:05.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.749855 ignition[717]: Ignition finished successfully Jul 2 11:32:05.754879 systemd[1]: Finished ignition-fetch.service. Jul 2 11:32:05.757009 systemd[1]: Starting ignition-kargs.service... Jul 2 11:32:05.768581 ignition[737]: Ignition 2.14.0 Jul 2 11:32:05.768600 ignition[737]: Stage: kargs Jul 2 11:32:05.768774 ignition[737]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:32:05.768809 ignition[737]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 11:32:05.770065 ignition[737]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 11:32:05.771585 ignition[737]: kargs: kargs passed Jul 2 11:32:05.772830 systemd[1]: Finished ignition-kargs.service. Jul 2 11:32:05.771664 ignition[737]: Ignition finished successfully Jul 2 11:32:05.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.774843 systemd[1]: Starting ignition-disks.service... Jul 2 11:32:05.786597 ignition[743]: Ignition 2.14.0 Jul 2 11:32:05.787619 ignition[743]: Stage: disks Jul 2 11:32:05.788469 ignition[743]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:32:05.789451 ignition[743]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 11:32:05.790871 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 11:32:05.793317 ignition[743]: disks: disks passed Jul 2 11:32:05.794097 ignition[743]: Ignition finished successfully Jul 2 11:32:05.795718 systemd[1]: Finished ignition-disks.service. Jul 2 11:32:05.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.796540 systemd[1]: Reached target initrd-root-device.target. Jul 2 11:32:05.797701 systemd[1]: Reached target local-fs-pre.target. Jul 2 11:32:05.799015 systemd[1]: Reached target local-fs.target. Jul 2 11:32:05.800286 systemd[1]: Reached target sysinit.target. Jul 2 11:32:05.801485 systemd[1]: Reached target basic.target. Jul 2 11:32:05.803945 systemd[1]: Starting systemd-fsck-root.service... Jul 2 11:32:05.822512 systemd-fsck[750]: ROOT: clean, 614/1628000 files, 124057/1617920 blocks Jul 2 11:32:05.826860 systemd[1]: Finished systemd-fsck-root.service. Jul 2 11:32:05.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.828596 systemd[1]: Mounting sysroot.mount... Jul 2 11:32:05.839560 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 11:32:05.840044 systemd[1]: Mounted sysroot.mount. Jul 2 11:32:05.840844 systemd[1]: Reached target initrd-root-fs.target. Jul 2 11:32:05.843296 systemd[1]: Mounting sysroot-usr.mount... Jul 2 11:32:05.844618 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 11:32:05.845619 systemd[1]: Starting flatcar-openstack-hostname.service... Jul 2 11:32:05.848828 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 11:32:05.848895 systemd[1]: Reached target ignition-diskful.target. Jul 2 11:32:05.854304 systemd[1]: Mounted sysroot-usr.mount. Jul 2 11:32:05.857367 systemd[1]: Starting initrd-setup-root.service... Jul 2 11:32:05.868179 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 11:32:05.880398 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory Jul 2 11:32:05.890087 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 11:32:05.902440 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 11:32:05.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:05.962808 systemd[1]: Finished initrd-setup-root.service. Jul 2 11:32:05.964743 systemd[1]: Starting ignition-mount.service... Jul 2 11:32:05.971375 systemd[1]: Starting sysroot-boot.service... Jul 2 11:32:05.977510 bash[804]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 11:32:05.991004 ignition[805]: INFO : Ignition 2.14.0 Jul 2 11:32:05.991004 ignition[805]: INFO : Stage: mount Jul 2 11:32:05.992642 ignition[805]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:32:05.992642 ignition[805]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 11:32:05.994911 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 11:32:05.996131 ignition[805]: INFO : mount: mount passed Jul 2 11:32:05.996808 ignition[805]: INFO : Ignition finished successfully Jul 2 11:32:05.999255 systemd[1]: Finished ignition-mount.service. Jul 2 11:32:05.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:06.004888 coreos-metadata[756]: Jul 02 11:32:06.004 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Jul 2 11:32:06.015027 systemd[1]: Finished sysroot-boot.service. Jul 2 11:32:06.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:06.053342 coreos-metadata[756]: Jul 02 11:32:06.053 INFO Fetch successful Jul 2 11:32:06.054258 coreos-metadata[756]: Jul 02 11:32:06.054 INFO wrote hostname srv-z4l15.gb1.brightbox.com to /sysroot/etc/hostname Jul 2 11:32:06.056474 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Jul 2 11:32:06.056682 systemd[1]: Finished flatcar-openstack-hostname.service. Jul 2 11:32:06.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:06.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:06.353661 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 11:32:06.365561 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (814) Jul 2 11:32:06.370894 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 11:32:06.370928 kernel: BTRFS info (device vda6): using free space tree Jul 2 11:32:06.370954 kernel: BTRFS info (device vda6): has skinny extents Jul 2 11:32:06.376519 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 11:32:06.378480 systemd[1]: Starting ignition-files.service... Jul 2 11:32:06.398973 ignition[834]: INFO : Ignition 2.14.0 Jul 2 11:32:06.398973 ignition[834]: INFO : Stage: files Jul 2 11:32:06.400781 ignition[834]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:32:06.400781 ignition[834]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 11:32:06.400781 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 11:32:06.404288 ignition[834]: DEBUG : files: compiled without relabeling support, skipping Jul 2 11:32:06.404288 ignition[834]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 11:32:06.404288 ignition[834]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 11:32:06.409473 ignition[834]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 11:32:06.409473 ignition[834]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 11:32:06.413417 ignition[834]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 11:32:06.413417 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 11:32:06.413417 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 11:32:06.410668 unknown[834]: wrote ssh authorized keys file for user: core Jul 2 11:32:06.578249 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 11:32:06.764870 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 11:32:06.766350 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 11:32:06.766350 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 11:32:06.766350 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 11:32:06.766350 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 11:32:06.766350 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 11:32:06.772035 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Jul 2 11:32:06.801943 systemd-networkd[712]: eth0: Gained IPv6LL Jul 2 11:32:07.482621 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Jul 2 11:32:08.310943 systemd-networkd[712]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8fb3:24:19ff:fee6:3ece/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8fb3:24:19ff:fee6:3ece/64 assigned by NDisc. Jul 2 11:32:08.310956 systemd-networkd[712]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Jul 2 11:32:10.623112 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 11:32:10.626133 ignition[834]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 11:32:10.627135 ignition[834]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 11:32:10.628421 ignition[834]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Jul 2 11:32:10.629588 ignition[834]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 11:32:10.631638 ignition[834]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 11:32:10.631638 ignition[834]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Jul 2 11:32:10.631638 ignition[834]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 11:32:10.631638 ignition[834]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 11:32:10.631638 ignition[834]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Jul 2 11:32:10.631638 ignition[834]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 11:32:10.642307 ignition[834]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 11:32:10.644004 ignition[834]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 11:32:10.644004 ignition[834]: INFO : files: files passed Jul 2 11:32:10.644004 ignition[834]: INFO : Ignition finished successfully Jul 2 11:32:10.649005 systemd[1]: Finished ignition-files.service. Jul 2 11:32:10.659158 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 11:32:10.659247 kernel: audit: type=1130 audit(1719919930.650:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.654192 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 11:32:10.661299 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 11:32:10.662931 systemd[1]: Starting ignition-quench.service... Jul 2 11:32:10.668830 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 11:32:10.668989 systemd[1]: Finished ignition-quench.service. Jul 2 11:32:10.681015 kernel: audit: type=1130 audit(1719919930.670:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.681043 kernel: audit: type=1131 audit(1719919930.670:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.671934 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 11:32:10.687714 kernel: audit: type=1130 audit(1719919930.681:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.687813 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 11:32:10.681843 systemd[1]: Reached target ignition-complete.target. Jul 2 11:32:10.689347 systemd[1]: Starting initrd-parse-etc.service... Jul 2 11:32:10.710673 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 11:32:10.710831 systemd[1]: Finished initrd-parse-etc.service. Jul 2 11:32:10.722897 kernel: audit: type=1130 audit(1719919930.711:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.722941 kernel: audit: type=1131 audit(1719919930.711:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.712436 systemd[1]: Reached target initrd-fs.target. Jul 2 11:32:10.723556 systemd[1]: Reached target initrd.target. Jul 2 11:32:10.724856 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 11:32:10.726184 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 11:32:10.744753 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 11:32:10.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.751550 kernel: audit: type=1130 audit(1719919930.745:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.751697 systemd[1]: Starting initrd-cleanup.service... Jul 2 11:32:10.767286 systemd[1]: Stopped target nss-lookup.target. Jul 2 11:32:10.768185 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 11:32:10.769776 systemd[1]: Stopped target timers.target. Jul 2 11:32:10.785987 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 11:32:10.792840 kernel: audit: type=1131 audit(1719919930.786:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.786217 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 11:32:10.787494 systemd[1]: Stopped target initrd.target. Jul 2 11:32:10.793647 systemd[1]: Stopped target basic.target. Jul 2 11:32:10.794908 systemd[1]: Stopped target ignition-complete.target. Jul 2 11:32:10.796186 systemd[1]: Stopped target ignition-diskful.target. Jul 2 11:32:10.797469 systemd[1]: Stopped target initrd-root-device.target. Jul 2 11:32:10.798765 systemd[1]: Stopped target remote-fs.target. Jul 2 11:32:10.800081 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 11:32:10.801359 systemd[1]: Stopped target sysinit.target. Jul 2 11:32:10.802651 systemd[1]: Stopped target local-fs.target. Jul 2 11:32:10.803871 systemd[1]: Stopped target local-fs-pre.target. Jul 2 11:32:10.805071 systemd[1]: Stopped target swap.target. Jul 2 11:32:10.812871 kernel: audit: type=1131 audit(1719919930.807:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.806291 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 11:32:10.806557 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 11:32:10.820214 kernel: audit: type=1131 audit(1719919930.814:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.807797 systemd[1]: Stopped target cryptsetup.target. Jul 2 11:32:10.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.813649 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 11:32:10.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.813887 systemd[1]: Stopped dracut-initqueue.service. Jul 2 11:32:10.815115 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 11:32:10.815351 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 11:32:10.821174 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 11:32:10.821408 systemd[1]: Stopped ignition-files.service. Jul 2 11:32:10.823972 systemd[1]: Stopping ignition-mount.service... Jul 2 11:32:10.832343 systemd[1]: Stopping iscsiuio.service... Jul 2 11:32:10.834996 systemd[1]: Stopping sysroot-boot.service... Jul 2 11:32:10.836547 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 11:32:10.837406 ignition[872]: INFO : Ignition 2.14.0 Jul 2 11:32:10.837406 ignition[872]: INFO : Stage: umount Jul 2 11:32:10.839121 ignition[872]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:32:10.839121 ignition[872]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 11:32:10.841600 ignition[872]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 11:32:10.841600 ignition[872]: INFO : umount: umount passed Jul 2 11:32:10.841600 ignition[872]: INFO : Ignition finished successfully Jul 2 11:32:10.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.842645 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 11:32:10.844332 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 11:32:10.844600 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 11:32:10.852097 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 11:32:10.853071 systemd[1]: Stopped iscsiuio.service. Jul 2 11:32:10.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.855151 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 11:32:10.856112 systemd[1]: Stopped ignition-mount.service. Jul 2 11:32:10.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.859199 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 11:32:10.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.860239 systemd[1]: Finished initrd-cleanup.service. Jul 2 11:32:10.865922 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 11:32:10.866307 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 11:32:10.866370 systemd[1]: Stopped ignition-disks.service. Jul 2 11:32:10.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.869365 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 11:32:10.869434 systemd[1]: Stopped ignition-kargs.service. Jul 2 11:32:10.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.871681 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 11:32:10.871748 systemd[1]: Stopped ignition-fetch.service. Jul 2 11:32:10.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.873997 systemd[1]: Stopped target network.target. Jul 2 11:32:10.875394 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 11:32:10.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.875459 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 11:32:10.877130 systemd[1]: Stopped target paths.target. Jul 2 11:32:10.877759 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 11:32:10.880231 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 11:32:10.881772 systemd[1]: Stopped target slices.target. Jul 2 11:32:10.882377 systemd[1]: Stopped target sockets.target. Jul 2 11:32:10.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.883044 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 11:32:10.883085 systemd[1]: Closed iscsid.socket. Jul 2 11:32:10.883758 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 11:32:10.883813 systemd[1]: Closed iscsiuio.socket. Jul 2 11:32:10.885083 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 11:32:10.885157 systemd[1]: Stopped ignition-setup.service. Jul 2 11:32:10.886740 systemd[1]: Stopping systemd-networkd.service... Jul 2 11:32:10.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.889779 systemd[1]: Stopping systemd-resolved.service... Jul 2 11:32:10.892594 systemd-networkd[712]: eth0: DHCPv6 lease lost Jul 2 11:32:10.895672 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 11:32:10.895840 systemd[1]: Stopped systemd-networkd.service. Jul 2 11:32:10.901000 audit: BPF prog-id=9 op=UNLOAD Jul 2 11:32:10.897950 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 11:32:10.897999 systemd[1]: Closed systemd-networkd.socket. Jul 2 11:32:10.902567 systemd[1]: Stopping network-cleanup.service... Jul 2 11:32:10.906012 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 11:32:10.906093 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 11:32:10.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.907766 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 11:32:10.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.907867 systemd[1]: Stopped systemd-sysctl.service. Jul 2 11:32:10.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.909568 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 11:32:10.909630 systemd[1]: Stopped systemd-modules-load.service. Jul 2 11:32:10.910892 systemd[1]: Stopping systemd-udevd.service... Jul 2 11:32:10.914505 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 11:32:10.915241 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 11:32:10.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.915393 systemd[1]: Stopped systemd-resolved.service. Jul 2 11:32:10.916995 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 11:32:10.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.917229 systemd[1]: Stopped systemd-udevd.service. Jul 2 11:32:10.919997 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 11:32:10.919000 audit: BPF prog-id=6 op=UNLOAD Jul 2 11:32:10.920126 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 11:32:10.923646 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 11:32:10.923701 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 11:32:10.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.924866 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 11:32:10.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.924925 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 11:32:10.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.926324 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 11:32:10.926390 systemd[1]: Stopped dracut-cmdline.service. Jul 2 11:32:10.927611 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 11:32:10.927707 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 11:32:10.930137 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 11:32:10.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.931177 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 11:32:10.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.931287 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 11:32:10.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.944778 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 11:32:10.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.944862 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 11:32:10.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:10.945738 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 11:32:10.945800 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 11:32:10.948668 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 11:32:10.949494 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 11:32:10.949645 systemd[1]: Stopped network-cleanup.service. Jul 2 11:32:10.964161 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 11:32:10.964301 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 11:32:11.022399 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 11:32:11.022650 systemd[1]: Stopped sysroot-boot.service. Jul 2 11:32:11.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:11.024225 systemd[1]: Reached target initrd-switch-root.target. Jul 2 11:32:11.025307 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 11:32:11.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:11.025377 systemd[1]: Stopped initrd-setup-root.service. Jul 2 11:32:11.027817 systemd[1]: Starting initrd-switch-root.service... Jul 2 11:32:11.045840 systemd[1]: Switching root. Jul 2 11:32:11.070811 iscsid[722]: iscsid shutting down. Jul 2 11:32:11.071696 systemd-journald[202]: Received SIGTERM from PID 1 (n/a). Jul 2 11:32:11.071775 systemd-journald[202]: Journal stopped Jul 2 11:32:15.267661 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 11:32:15.267771 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 11:32:15.267795 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 11:32:15.267819 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 11:32:15.267844 kernel: SELinux: policy capability open_perms=1 Jul 2 11:32:15.267864 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 11:32:15.267883 kernel: SELinux: policy capability always_check_network=0 Jul 2 11:32:15.267901 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 11:32:15.267920 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 11:32:15.267951 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 11:32:15.267971 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 11:32:15.267993 systemd[1]: Successfully loaded SELinux policy in 69.508ms. Jul 2 11:32:15.268036 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.773ms. Jul 2 11:32:15.268071 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 11:32:15.268094 systemd[1]: Detected virtualization kvm. Jul 2 11:32:15.268115 systemd[1]: Detected architecture x86-64. Jul 2 11:32:15.268142 systemd[1]: Detected first boot. Jul 2 11:32:15.268163 systemd[1]: Hostname set to . Jul 2 11:32:15.268184 systemd[1]: Initializing machine ID from VM UUID. Jul 2 11:32:15.268204 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 11:32:15.268224 systemd[1]: Populated /etc with preset unit settings. Jul 2 11:32:15.268271 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 11:32:15.268296 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 11:32:15.268319 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 11:32:15.268355 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 11:32:15.268390 systemd[1]: Stopped iscsid.service. Jul 2 11:32:15.268413 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 11:32:15.268434 systemd[1]: Stopped initrd-switch-root.service. Jul 2 11:32:15.268470 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 11:32:15.268492 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 11:32:15.268547 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 11:32:15.268580 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 11:32:15.268610 systemd[1]: Created slice system-getty.slice. Jul 2 11:32:15.268638 systemd[1]: Created slice system-modprobe.slice. Jul 2 11:32:15.268660 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 11:32:15.268692 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 11:32:15.268716 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 11:32:15.268753 systemd[1]: Created slice user.slice. Jul 2 11:32:15.268775 systemd[1]: Started systemd-ask-password-console.path. Jul 2 11:32:15.268795 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 11:32:15.268817 systemd[1]: Set up automount boot.automount. Jul 2 11:32:15.268837 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 11:32:15.268873 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 11:32:15.268906 systemd[1]: Stopped target initrd-fs.target. Jul 2 11:32:15.268928 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 11:32:15.268949 systemd[1]: Reached target integritysetup.target. Jul 2 11:32:15.268970 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 11:32:15.268990 systemd[1]: Reached target remote-fs.target. Jul 2 11:32:15.269011 systemd[1]: Reached target slices.target. Jul 2 11:32:15.269031 systemd[1]: Reached target swap.target. Jul 2 11:32:15.269058 systemd[1]: Reached target torcx.target. Jul 2 11:32:15.269079 systemd[1]: Reached target veritysetup.target. Jul 2 11:32:15.269100 systemd[1]: Listening on systemd-coredump.socket. Jul 2 11:32:15.269133 systemd[1]: Listening on systemd-initctl.socket. Jul 2 11:32:15.269155 systemd[1]: Listening on systemd-networkd.socket. Jul 2 11:32:15.269175 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 11:32:15.269196 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 11:32:15.269216 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 11:32:15.269237 systemd[1]: Mounting dev-hugepages.mount... Jul 2 11:32:15.269263 systemd[1]: Mounting dev-mqueue.mount... Jul 2 11:32:15.269284 systemd[1]: Mounting media.mount... Jul 2 11:32:15.269305 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:32:15.269349 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 11:32:15.269387 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 11:32:15.269409 systemd[1]: Mounting tmp.mount... Jul 2 11:32:15.269436 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 11:32:15.269464 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 11:32:15.269486 systemd[1]: Starting kmod-static-nodes.service... Jul 2 11:32:15.269507 systemd[1]: Starting modprobe@configfs.service... Jul 2 11:32:15.269576 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 11:32:15.269601 systemd[1]: Starting modprobe@drm.service... Jul 2 11:32:15.269636 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 11:32:15.269659 systemd[1]: Starting modprobe@fuse.service... Jul 2 11:32:15.269681 systemd[1]: Starting modprobe@loop.service... Jul 2 11:32:15.269703 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 11:32:15.269724 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 11:32:15.269745 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 11:32:15.269765 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 11:32:15.269786 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 11:32:15.269807 systemd[1]: Stopped systemd-journald.service. Jul 2 11:32:15.269839 systemd[1]: Starting systemd-journald.service... Jul 2 11:32:15.269861 systemd[1]: Starting systemd-modules-load.service... Jul 2 11:32:15.269881 kernel: loop: module loaded Jul 2 11:32:15.269901 systemd[1]: Starting systemd-network-generator.service... Jul 2 11:32:15.269922 systemd[1]: Starting systemd-remount-fs.service... Jul 2 11:32:15.269942 kernel: fuse: init (API version 7.34) Jul 2 11:32:15.269973 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 11:32:15.269996 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 11:32:15.270018 systemd[1]: Stopped verity-setup.service. Jul 2 11:32:15.270049 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:32:15.270072 systemd[1]: Mounted dev-hugepages.mount. Jul 2 11:32:15.270093 systemd[1]: Mounted dev-mqueue.mount. Jul 2 11:32:15.270114 systemd[1]: Mounted media.mount. Jul 2 11:32:15.270136 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 11:32:15.270169 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 11:32:15.270192 systemd[1]: Mounted tmp.mount. Jul 2 11:32:15.270213 systemd[1]: Finished kmod-static-nodes.service. Jul 2 11:32:15.270233 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 11:32:15.270254 systemd[1]: Finished modprobe@configfs.service. Jul 2 11:32:15.270274 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 11:32:15.270295 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 11:32:15.270316 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 11:32:15.270359 systemd-journald[982]: Journal started Jul 2 11:32:15.270439 systemd-journald[982]: Runtime Journal (/run/log/journal/80e33e3d7e6d4377a128b042c3be0a18) is 4.7M, max 38.1M, 33.3M free. Jul 2 11:32:11.265000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 11:32:11.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 11:32:11.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 11:32:11.360000 audit: BPF prog-id=10 op=LOAD Jul 2 11:32:11.360000 audit: BPF prog-id=10 op=UNLOAD Jul 2 11:32:11.360000 audit: BPF prog-id=11 op=LOAD Jul 2 11:32:11.360000 audit: BPF prog-id=11 op=UNLOAD Jul 2 11:32:11.502000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 11:32:11.502000 audit[904]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:11.502000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 11:32:11.506000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 11:32:11.506000 audit[904]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:11.506000 audit: CWD cwd="/" Jul 2 11:32:11.506000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:11.506000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:11.506000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 11:32:14.978000 audit: BPF prog-id=12 op=LOAD Jul 2 11:32:14.978000 audit: BPF prog-id=3 op=UNLOAD Jul 2 11:32:14.978000 audit: BPF prog-id=13 op=LOAD Jul 2 11:32:14.978000 audit: BPF prog-id=14 op=LOAD Jul 2 11:32:14.978000 audit: BPF prog-id=4 op=UNLOAD Jul 2 11:32:14.978000 audit: BPF prog-id=5 op=UNLOAD Jul 2 11:32:14.981000 audit: BPF prog-id=15 op=LOAD Jul 2 11:32:14.981000 audit: BPF prog-id=12 op=UNLOAD Jul 2 11:32:14.981000 audit: BPF prog-id=16 op=LOAD Jul 2 11:32:14.981000 audit: BPF prog-id=17 op=LOAD Jul 2 11:32:14.981000 audit: BPF prog-id=13 op=UNLOAD Jul 2 11:32:14.982000 audit: BPF prog-id=14 op=UNLOAD Jul 2 11:32:14.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:14.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:14.993000 audit: BPF prog-id=15 op=UNLOAD Jul 2 11:32:14.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:14.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.166000 audit: BPF prog-id=18 op=LOAD Jul 2 11:32:15.167000 audit: BPF prog-id=19 op=LOAD Jul 2 11:32:15.167000 audit: BPF prog-id=20 op=LOAD Jul 2 11:32:15.167000 audit: BPF prog-id=16 op=UNLOAD Jul 2 11:32:15.167000 audit: BPF prog-id=17 op=UNLOAD Jul 2 11:32:15.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.264000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 11:32:15.264000 audit[982]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd445e6c00 a2=4000 a3=7ffd445e6c9c items=0 ppid=1 pid=982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:15.264000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 11:32:15.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:14.975695 systemd[1]: Queued start job for default target multi-user.target. Jul 2 11:32:15.279859 systemd[1]: Finished modprobe@drm.service. Jul 2 11:32:15.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:11.482855 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 11:32:14.975736 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 11:32:11.493184 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 11:32:14.983706 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 11:32:11.493234 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 11:32:11.493311 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 11:32:11.493330 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 11:32:11.493405 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 11:32:11.493427 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 11:32:15.283039 systemd[1]: Started systemd-journald.service. Jul 2 11:32:15.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.282834 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 11:32:11.493837 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 11:32:15.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.283051 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 11:32:11.493908 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 11:32:15.284219 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 11:32:11.493953 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 11:32:11.502368 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 11:32:11.502426 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 11:32:11.502491 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 11:32:11.502531 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 11:32:11.502567 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 11:32:11.502593 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 11:32:14.365305 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 11:32:14.366371 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 11:32:14.366643 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 11:32:14.367075 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 11:32:14.367218 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 11:32:14.367388 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-07-02T11:32:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 11:32:15.288126 systemd[1]: Finished modprobe@fuse.service. Jul 2 11:32:15.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.289816 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 11:32:15.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.291623 systemd[1]: Finished modprobe@loop.service. Jul 2 11:32:15.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.292797 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 11:32:15.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.293868 systemd[1]: Finished systemd-modules-load.service. Jul 2 11:32:15.295071 systemd[1]: Finished systemd-network-generator.service. Jul 2 11:32:15.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.296261 systemd[1]: Finished systemd-remount-fs.service. Jul 2 11:32:15.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.297992 systemd[1]: Reached target network-pre.target. Jul 2 11:32:15.300698 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 11:32:15.306518 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 11:32:15.309914 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 11:32:15.312263 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 11:32:15.315486 systemd[1]: Starting systemd-journal-flush.service... Jul 2 11:32:15.319756 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 11:32:15.321448 systemd[1]: Starting systemd-random-seed.service... Jul 2 11:32:15.322260 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 11:32:15.331319 systemd[1]: Starting systemd-sysctl.service... Jul 2 11:32:15.335028 systemd[1]: Starting systemd-sysusers.service... Jul 2 11:32:15.344505 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 11:32:15.345430 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 11:32:15.348003 systemd-journald[982]: Time spent on flushing to /var/log/journal/80e33e3d7e6d4377a128b042c3be0a18 is 76.097ms for 1291 entries. Jul 2 11:32:15.348003 systemd-journald[982]: System Journal (/var/log/journal/80e33e3d7e6d4377a128b042c3be0a18) is 8.0M, max 584.8M, 576.8M free. Jul 2 11:32:15.443214 systemd-journald[982]: Received client request to flush runtime journal. Jul 2 11:32:15.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.351005 systemd[1]: Finished systemd-random-seed.service. Jul 2 11:32:15.351843 systemd[1]: Reached target first-boot-complete.target. Jul 2 11:32:15.376588 systemd[1]: Finished systemd-sysctl.service. Jul 2 11:32:15.386726 systemd[1]: Finished systemd-sysusers.service. Jul 2 11:32:15.390126 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 11:32:15.444456 systemd[1]: Finished systemd-journal-flush.service. Jul 2 11:32:15.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.452803 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 11:32:15.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.461578 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 11:32:15.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:15.464104 systemd[1]: Starting systemd-udev-settle.service... Jul 2 11:32:15.475692 udevadm[1017]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 11:32:16.008003 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 11:32:16.016622 kernel: kauditd_printk_skb: 102 callbacks suppressed Jul 2 11:32:16.016788 kernel: audit: type=1130 audit(1719919936.008:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.018798 kernel: audit: type=1334 audit(1719919936.016:141): prog-id=21 op=LOAD Jul 2 11:32:16.016000 audit: BPF prog-id=21 op=LOAD Jul 2 11:32:16.017779 systemd[1]: Starting systemd-udevd.service... Jul 2 11:32:16.016000 audit: BPF prog-id=22 op=LOAD Jul 2 11:32:16.016000 audit: BPF prog-id=7 op=UNLOAD Jul 2 11:32:16.016000 audit: BPF prog-id=8 op=UNLOAD Jul 2 11:32:16.019541 kernel: audit: type=1334 audit(1719919936.016:142): prog-id=22 op=LOAD Jul 2 11:32:16.019606 kernel: audit: type=1334 audit(1719919936.016:143): prog-id=7 op=UNLOAD Jul 2 11:32:16.019658 kernel: audit: type=1334 audit(1719919936.016:144): prog-id=8 op=UNLOAD Jul 2 11:32:16.050677 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Jul 2 11:32:16.083893 systemd[1]: Started systemd-udevd.service. Jul 2 11:32:16.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.093560 kernel: audit: type=1130 audit(1719919936.084:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.095000 audit: BPF prog-id=23 op=LOAD Jul 2 11:32:16.097218 systemd[1]: Starting systemd-networkd.service... Jul 2 11:32:16.101576 kernel: audit: type=1334 audit(1719919936.095:146): prog-id=23 op=LOAD Jul 2 11:32:16.119765 kernel: audit: type=1334 audit(1719919936.110:147): prog-id=24 op=LOAD Jul 2 11:32:16.119892 kernel: audit: type=1334 audit(1719919936.111:148): prog-id=25 op=LOAD Jul 2 11:32:16.119942 kernel: audit: type=1334 audit(1719919936.111:149): prog-id=26 op=LOAD Jul 2 11:32:16.110000 audit: BPF prog-id=24 op=LOAD Jul 2 11:32:16.111000 audit: BPF prog-id=25 op=LOAD Jul 2 11:32:16.111000 audit: BPF prog-id=26 op=LOAD Jul 2 11:32:16.112629 systemd[1]: Starting systemd-userdbd.service... Jul 2 11:32:16.155978 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 11:32:16.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.180652 systemd[1]: Started systemd-userdbd.service. Jul 2 11:32:16.292606 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Jul 2 11:32:16.302657 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 11:32:16.311067 systemd-networkd[1032]: lo: Link UP Jul 2 11:32:16.311079 systemd-networkd[1032]: lo: Gained carrier Jul 2 11:32:16.313091 systemd-networkd[1032]: Enumeration completed Jul 2 11:32:16.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.313382 systemd[1]: Started systemd-networkd.service. Jul 2 11:32:16.316906 systemd-networkd[1032]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 11:32:16.319224 kernel: ACPI: button: Power Button [PWRF] Jul 2 11:32:16.320039 systemd-networkd[1032]: eth0: Link UP Jul 2 11:32:16.320050 systemd-networkd[1032]: eth0: Gained carrier Jul 2 11:32:16.337718 systemd-networkd[1032]: eth0: DHCPv4 address 10.230.62.206/30, gateway 10.230.62.205 acquired from 10.230.62.205 Jul 2 11:32:16.384667 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 11:32:16.369000 audit[1021]: AVC avc: denied { confidentiality } for pid=1021 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 11:32:16.369000 audit[1021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5589f36681f0 a1=3207c a2=7f5bd3f85bc5 a3=5 items=108 ppid=1018 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:16.369000 audit: CWD cwd="/" Jul 2 11:32:16.369000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=1 name=(null) inode=15543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=2 name=(null) inode=15543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=3 name=(null) inode=15544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=4 name=(null) inode=15543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=5 name=(null) inode=15545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=6 name=(null) inode=15543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=7 name=(null) inode=15546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=8 name=(null) inode=15546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=9 name=(null) inode=15547 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=10 name=(null) inode=15546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=11 name=(null) inode=15548 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=12 name=(null) inode=15546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=13 name=(null) inode=15549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=14 name=(null) inode=15546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=15 name=(null) inode=15550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=16 name=(null) inode=15546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=17 name=(null) inode=15551 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=18 name=(null) inode=15543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=19 name=(null) inode=15552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=20 name=(null) inode=15552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=21 name=(null) inode=15553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=22 name=(null) inode=15552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=23 name=(null) inode=15554 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=24 name=(null) inode=15552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=25 name=(null) inode=15555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=26 name=(null) inode=15552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=27 name=(null) inode=15556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=28 name=(null) inode=15552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=29 name=(null) inode=15557 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=30 name=(null) inode=15543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=31 name=(null) inode=15558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=32 name=(null) inode=15558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=33 name=(null) inode=15559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=34 name=(null) inode=15558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=35 name=(null) inode=15560 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=36 name=(null) inode=15558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=37 name=(null) inode=15561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=38 name=(null) inode=15558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=39 name=(null) inode=15562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=40 name=(null) inode=15558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=41 name=(null) inode=15563 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=42 name=(null) inode=15543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=43 name=(null) inode=15564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=44 name=(null) inode=15564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=45 name=(null) inode=15565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=46 name=(null) inode=15564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=47 name=(null) inode=15566 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=48 name=(null) inode=15564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=49 name=(null) inode=15567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=50 name=(null) inode=15564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=51 name=(null) inode=15568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=52 name=(null) inode=15564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=53 name=(null) inode=15569 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=55 name=(null) inode=15570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=56 name=(null) inode=15570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=57 name=(null) inode=15571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=58 name=(null) inode=15570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=59 name=(null) inode=15572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=60 name=(null) inode=15570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=61 name=(null) inode=15573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=62 name=(null) inode=15573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=63 name=(null) inode=15574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=64 name=(null) inode=15573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=65 name=(null) inode=15575 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=66 name=(null) inode=15573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=67 name=(null) inode=15576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=68 name=(null) inode=15573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=69 name=(null) inode=15577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=70 name=(null) inode=15573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=71 name=(null) inode=15578 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=72 name=(null) inode=15570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=73 name=(null) inode=15579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=74 name=(null) inode=15579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=75 name=(null) inode=15580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=76 name=(null) inode=15579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=77 name=(null) inode=15581 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=78 name=(null) inode=15579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=79 name=(null) inode=15582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=80 name=(null) inode=15579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=81 name=(null) inode=15583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=82 name=(null) inode=15579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=83 name=(null) inode=15584 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=84 name=(null) inode=15570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=85 name=(null) inode=15585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=86 name=(null) inode=15585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=87 name=(null) inode=15586 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=88 name=(null) inode=15585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=89 name=(null) inode=15587 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=90 name=(null) inode=15585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=91 name=(null) inode=15588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=92 name=(null) inode=15585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=93 name=(null) inode=15589 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=94 name=(null) inode=15585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=95 name=(null) inode=15590 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=96 name=(null) inode=15570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=97 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=98 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=99 name=(null) inode=15592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=100 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=101 name=(null) inode=15593 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=102 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=103 name=(null) inode=15594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=104 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=105 name=(null) inode=15595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=106 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PATH item=107 name=(null) inode=15596 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:32:16.369000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 11:32:16.463546 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 2 11:32:16.467549 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 2 11:32:16.467867 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 2 11:32:16.468107 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Jul 2 11:32:16.599414 systemd[1]: Finished systemd-udev-settle.service. Jul 2 11:32:16.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.604474 systemd[1]: Starting lvm2-activation-early.service... Jul 2 11:32:16.629376 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 11:32:16.665197 systemd[1]: Finished lvm2-activation-early.service. Jul 2 11:32:16.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.666216 systemd[1]: Reached target cryptsetup.target. Jul 2 11:32:16.668960 systemd[1]: Starting lvm2-activation.service... Jul 2 11:32:16.675391 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 11:32:16.707230 systemd[1]: Finished lvm2-activation.service. Jul 2 11:32:16.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.708171 systemd[1]: Reached target local-fs-pre.target. Jul 2 11:32:16.708867 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 11:32:16.708914 systemd[1]: Reached target local-fs.target. Jul 2 11:32:16.709556 systemd[1]: Reached target machines.target. Jul 2 11:32:16.712360 systemd[1]: Starting ldconfig.service... Jul 2 11:32:16.713663 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 11:32:16.713721 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:32:16.716372 systemd[1]: Starting systemd-boot-update.service... Jul 2 11:32:16.719089 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 11:32:16.728801 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 11:32:16.732555 systemd[1]: Starting systemd-sysext.service... Jul 2 11:32:16.735108 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) Jul 2 11:32:16.738800 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 11:32:16.804135 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 11:32:16.819242 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 11:32:16.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.824126 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 11:32:16.824420 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 11:32:16.848612 kernel: loop0: detected capacity change from 0 to 211296 Jul 2 11:32:16.879660 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 11:32:16.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.881675 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 11:32:16.903035 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 11:32:16.921962 kernel: loop1: detected capacity change from 0 to 211296 Jul 2 11:32:16.936081 (sd-sysext)[1062]: Using extensions 'kubernetes'. Jul 2 11:32:16.937458 (sd-sysext)[1062]: Merged extensions into '/usr'. Jul 2 11:32:16.968439 systemd-fsck[1059]: fsck.fat 4.2 (2021-01-31) Jul 2 11:32:16.968439 systemd-fsck[1059]: /dev/vda1: 789 files, 119238/258078 clusters Jul 2 11:32:16.984262 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 11:32:16.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:16.998928 systemd[1]: Mounting boot.mount... Jul 2 11:32:16.999633 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:32:17.002012 systemd[1]: Mounting usr-share-oem.mount... Jul 2 11:32:17.005849 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.007871 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 11:32:17.010363 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 11:32:17.014699 systemd[1]: Starting modprobe@loop.service... Jul 2 11:32:17.016051 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.016305 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:32:17.016556 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:32:17.021428 systemd[1]: Mounted usr-share-oem.mount. Jul 2 11:32:17.024332 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 11:32:17.024718 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 11:32:17.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.028967 systemd[1]: Finished systemd-sysext.service. Jul 2 11:32:17.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.030786 systemd[1]: Mounted boot.mount. Jul 2 11:32:17.034714 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 11:32:17.034909 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 11:32:17.035976 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 11:32:17.036164 systemd[1]: Finished modprobe@loop.service. Jul 2 11:32:17.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.040289 systemd[1]: Starting ensure-sysext.service... Jul 2 11:32:17.041006 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 11:32:17.041085 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.042612 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 11:32:17.052372 systemd[1]: Reloading. Jul 2 11:32:17.071718 systemd-tmpfiles[1070]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 11:32:17.075164 systemd-tmpfiles[1070]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 11:32:17.089468 systemd-tmpfiles[1070]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 11:32:17.208047 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2024-07-02T11:32:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 11:32:17.211675 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2024-07-02T11:32:17Z" level=info msg="torcx already run" Jul 2 11:32:17.286449 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 11:32:17.373747 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 11:32:17.373781 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 11:32:17.402747 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 11:32:17.489000 audit: BPF prog-id=27 op=LOAD Jul 2 11:32:17.489000 audit: BPF prog-id=18 op=UNLOAD Jul 2 11:32:17.489000 audit: BPF prog-id=28 op=LOAD Jul 2 11:32:17.489000 audit: BPF prog-id=29 op=LOAD Jul 2 11:32:17.489000 audit: BPF prog-id=19 op=UNLOAD Jul 2 11:32:17.489000 audit: BPF prog-id=20 op=UNLOAD Jul 2 11:32:17.490000 audit: BPF prog-id=30 op=LOAD Jul 2 11:32:17.490000 audit: BPF prog-id=24 op=UNLOAD Jul 2 11:32:17.491000 audit: BPF prog-id=31 op=LOAD Jul 2 11:32:17.491000 audit: BPF prog-id=32 op=LOAD Jul 2 11:32:17.491000 audit: BPF prog-id=25 op=UNLOAD Jul 2 11:32:17.491000 audit: BPF prog-id=26 op=UNLOAD Jul 2 11:32:17.492000 audit: BPF prog-id=33 op=LOAD Jul 2 11:32:17.492000 audit: BPF prog-id=23 op=UNLOAD Jul 2 11:32:17.495000 audit: BPF prog-id=34 op=LOAD Jul 2 11:32:17.496000 audit: BPF prog-id=35 op=LOAD Jul 2 11:32:17.496000 audit: BPF prog-id=21 op=UNLOAD Jul 2 11:32:17.496000 audit: BPF prog-id=22 op=UNLOAD Jul 2 11:32:17.504931 systemd[1]: Finished ldconfig.service. Jul 2 11:32:17.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.506245 systemd[1]: Finished systemd-boot-update.service. Jul 2 11:32:17.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.508500 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 11:32:17.514213 systemd[1]: Starting audit-rules.service... Jul 2 11:32:17.516778 systemd[1]: Starting clean-ca-certificates.service... Jul 2 11:32:17.519588 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 11:32:17.525000 audit: BPF prog-id=36 op=LOAD Jul 2 11:32:17.528096 systemd[1]: Starting systemd-resolved.service... Jul 2 11:32:17.529000 audit: BPF prog-id=37 op=LOAD Jul 2 11:32:17.534200 systemd[1]: Starting systemd-timesyncd.service... Jul 2 11:32:17.536699 systemd[1]: Starting systemd-update-utmp.service... Jul 2 11:32:17.538942 systemd[1]: Finished clean-ca-certificates.service. Jul 2 11:32:17.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.549649 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.551485 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 11:32:17.554175 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 11:32:17.558954 systemd[1]: Starting modprobe@loop.service... Jul 2 11:32:17.559855 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.560112 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:32:17.560413 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 11:32:17.562445 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 11:32:17.562804 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 11:32:17.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.564345 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 11:32:17.569035 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 11:32:17.569284 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 11:32:17.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.570746 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.572760 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 11:32:17.573588 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.573911 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:32:17.574127 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 11:32:17.579496 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.584212 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 11:32:17.587900 systemd[1]: Starting modprobe@drm.service... Jul 2 11:32:17.590718 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.590904 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:32:17.593195 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 11:32:17.594077 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 11:32:17.599167 systemd[1]: Finished ensure-sysext.service. Jul 2 11:32:17.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.601050 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 11:32:17.602708 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 11:32:17.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.603744 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 11:32:17.606000 audit[1146]: SYSTEM_BOOT pid=1146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.610711 systemd[1]: Finished systemd-update-utmp.service. Jul 2 11:32:17.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.613014 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 11:32:17.613220 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 11:32:17.614425 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 11:32:17.614647 systemd[1]: Finished modprobe@drm.service. Jul 2 11:32:17.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.616570 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 11:32:17.616800 systemd[1]: Finished modprobe@loop.service. Jul 2 11:32:17.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.617723 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.625016 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 11:32:17.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.627724 systemd[1]: Starting systemd-update-done.service... Jul 2 11:32:17.645997 systemd[1]: Finished systemd-update-done.service. Jul 2 11:32:17.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:17.676000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 11:32:17.676000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe0728b2c0 a2=420 a3=0 items=0 ppid=1137 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:17.676000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 11:32:17.677571 augenrules[1165]: No rules Jul 2 11:32:17.677666 systemd[1]: Finished audit-rules.service. Jul 2 11:32:17.689826 systemd[1]: Started systemd-timesyncd.service. Jul 2 11:32:17.690644 systemd[1]: Reached target time-set.target. Jul 2 11:32:17.692345 systemd-resolved[1141]: Positive Trust Anchors: Jul 2 11:32:17.693106 systemd-resolved[1141]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 11:32:17.694141 systemd-resolved[1141]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 11:32:17.702268 systemd-resolved[1141]: Using system hostname 'srv-z4l15.gb1.brightbox.com'. Jul 2 11:32:17.705118 systemd[1]: Started systemd-resolved.service. Jul 2 11:32:17.705888 systemd[1]: Reached target network.target. Jul 2 11:32:17.706564 systemd[1]: Reached target nss-lookup.target. Jul 2 11:32:17.707231 systemd[1]: Reached target sysinit.target. Jul 2 11:32:17.708080 systemd[1]: Started motdgen.path. Jul 2 11:32:17.708754 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 11:32:17.709745 systemd[1]: Started logrotate.timer. Jul 2 11:32:17.710539 systemd[1]: Started mdadm.timer. Jul 2 11:32:17.711168 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 11:32:17.711878 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 11:32:17.711965 systemd[1]: Reached target paths.target. Jul 2 11:32:17.712577 systemd[1]: Reached target timers.target. Jul 2 11:32:17.713666 systemd[1]: Listening on dbus.socket. Jul 2 11:32:17.730315 systemd[1]: Starting docker.socket... Jul 2 11:32:17.734924 systemd[1]: Listening on sshd.socket. Jul 2 11:32:17.735733 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:32:17.736400 systemd[1]: Listening on docker.socket. Jul 2 11:32:17.737277 systemd[1]: Reached target sockets.target. Jul 2 11:32:17.737936 systemd[1]: Reached target basic.target. Jul 2 11:32:17.738696 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.738748 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 11:32:17.740406 systemd[1]: Starting containerd.service... Jul 2 11:32:17.744322 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 11:32:17.746920 systemd[1]: Starting dbus.service... Jul 2 11:32:17.750655 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 11:32:17.755313 systemd[1]: Starting extend-filesystems.service... Jul 2 11:32:17.757201 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 11:32:17.762896 systemd[1]: Starting motdgen.service... Jul 2 11:32:17.765879 jq[1178]: false Jul 2 11:32:17.765723 systemd[1]: Starting prepare-helm.service... Jul 2 11:32:17.770803 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 11:32:17.773882 systemd[1]: Starting sshd-keygen.service... Jul 2 11:32:17.780935 systemd[1]: Starting systemd-logind.service... Jul 2 11:32:17.781666 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:32:17.781920 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 11:32:17.782777 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 11:32:17.784870 systemd[1]: Starting update-engine.service... Jul 2 11:32:17.792472 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 11:32:17.797026 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 11:32:17.797480 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 11:32:17.803404 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 11:32:17.803790 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 11:32:17.822309 jq[1190]: true Jul 2 11:32:17.824982 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:32:17.825040 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:32:17.832095 extend-filesystems[1179]: Found loop1 Jul 2 11:32:17.837964 extend-filesystems[1179]: Found vda Jul 2 11:32:17.837964 extend-filesystems[1179]: Found vda1 Jul 2 11:32:17.837964 extend-filesystems[1179]: Found vda2 Jul 2 11:32:17.846498 extend-filesystems[1179]: Found vda3 Jul 2 11:32:17.846498 extend-filesystems[1179]: Found usr Jul 2 11:32:17.846498 extend-filesystems[1179]: Found vda4 Jul 2 11:32:17.846498 extend-filesystems[1179]: Found vda6 Jul 2 11:32:17.846498 extend-filesystems[1179]: Found vda7 Jul 2 11:32:17.846498 extend-filesystems[1179]: Found vda9 Jul 2 11:32:17.846498 extend-filesystems[1179]: Checking size of /dev/vda9 Jul 2 11:32:18.685624 extend-filesystems[1179]: Resized partition /dev/vda9 Jul 2 11:32:17.866298 systemd[1]: Started dbus.service. Jul 2 11:32:18.691059 tar[1192]: linux-amd64/helm Jul 2 11:32:17.865403 dbus-daemon[1175]: [system] SELinux support is enabled Jul 2 11:32:18.693654 jq[1204]: true Jul 2 11:32:17.880819 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 11:32:17.886453 dbus-daemon[1175]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1032 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 11:32:17.880898 systemd[1]: Reached target system-config.target. Jul 2 11:32:17.888431 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 11:32:18.718541 extend-filesystems[1219]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 11:32:18.729138 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Jul 2 11:32:17.881807 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 11:32:17.881848 systemd[1]: Reached target user-config.target. Jul 2 11:32:17.885200 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 11:32:17.885556 systemd[1]: Finished motdgen.service. Jul 2 11:32:17.895991 systemd[1]: Starting systemd-hostnamed.service... Jul 2 11:32:18.680389 systemd-resolved[1141]: Clock change detected. Flushing caches. Jul 2 11:32:18.680649 systemd-timesyncd[1145]: Contacted time server 178.79.155.116:123 (0.flatcar.pool.ntp.org). Jul 2 11:32:18.680735 systemd-timesyncd[1145]: Initial clock synchronization to Tue 2024-07-02 11:32:18.680306 UTC. Jul 2 11:32:18.702469 systemd-networkd[1032]: eth0: Gained IPv6LL Jul 2 11:32:18.716544 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 11:32:18.717479 systemd[1]: Reached target network-online.target. Jul 2 11:32:18.720287 systemd[1]: Starting kubelet.service... Jul 2 11:32:18.765464 update_engine[1189]: I0702 11:32:18.757283 1189 main.cc:92] Flatcar Update Engine starting Jul 2 11:32:18.763590 systemd[1]: Started update-engine.service. Jul 2 11:32:18.767155 systemd[1]: Started locksmithd.service. Jul 2 11:32:18.769043 update_engine[1189]: I0702 11:32:18.768662 1189 update_check_scheduler.cc:74] Next update check in 8m31s Jul 2 11:32:18.828701 bash[1231]: Updated "/home/core/.ssh/authorized_keys" Jul 2 11:32:18.829757 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 11:32:18.847818 systemd-logind[1186]: Watching system buttons on /dev/input/event2 (Power Button) Jul 2 11:32:18.847871 systemd-logind[1186]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 11:32:18.850261 systemd-logind[1186]: New seat seat0. Jul 2 11:32:18.858063 systemd[1]: Started systemd-logind.service. Jul 2 11:32:18.903695 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Jul 2 11:32:18.923633 extend-filesystems[1219]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 2 11:32:18.923633 extend-filesystems[1219]: old_desc_blocks = 1, new_desc_blocks = 8 Jul 2 11:32:18.923633 extend-filesystems[1219]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Jul 2 11:32:18.927047 extend-filesystems[1179]: Resized filesystem in /dev/vda9 Jul 2 11:32:18.925556 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 11:32:18.925880 systemd[1]: Finished extend-filesystems.service. Jul 2 11:32:18.935064 env[1193]: time="2024-07-02T11:32:18.934956974Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 11:32:19.020792 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 11:32:19.020994 systemd[1]: Started systemd-hostnamed.service. Jul 2 11:32:19.021790 dbus-daemon[1175]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1208 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 11:32:19.026268 systemd[1]: Starting polkit.service... Jul 2 11:32:19.058396 polkitd[1238]: Started polkitd version 121 Jul 2 11:32:19.072804 env[1193]: time="2024-07-02T11:32:19.072751107Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 11:32:19.083011 env[1193]: time="2024-07-02T11:32:19.082922152Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 11:32:19.083827 polkitd[1238]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 11:32:19.084110 polkitd[1238]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 11:32:19.086186 env[1193]: time="2024-07-02T11:32:19.086082553Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 11:32:19.086517 env[1193]: time="2024-07-02T11:32:19.086485252Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 11:32:19.087188 env[1193]: time="2024-07-02T11:32:19.087153411Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 11:32:19.087476 env[1193]: time="2024-07-02T11:32:19.087444965Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 11:32:19.087766 env[1193]: time="2024-07-02T11:32:19.087733373Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 11:32:19.088096 env[1193]: time="2024-07-02T11:32:19.088065495Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 11:32:19.088466 env[1193]: time="2024-07-02T11:32:19.088420091Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 11:32:19.088717 polkitd[1238]: Finished loading, compiling and executing 2 rules Jul 2 11:32:19.089441 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 11:32:19.089709 systemd[1]: Started polkit.service. Jul 2 11:32:19.090259 polkitd[1238]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 11:32:19.093068 env[1193]: time="2024-07-02T11:32:19.093035017Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 11:32:19.095285 env[1193]: time="2024-07-02T11:32:19.095236328Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 11:32:19.095876 env[1193]: time="2024-07-02T11:32:19.095844012Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 11:32:19.096509 env[1193]: time="2024-07-02T11:32:19.096467607Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 11:32:19.098683 env[1193]: time="2024-07-02T11:32:19.098633418Z" level=info msg="metadata content store policy set" policy=shared Jul 2 11:32:19.107596 env[1193]: time="2024-07-02T11:32:19.107546228Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 11:32:19.107827 env[1193]: time="2024-07-02T11:32:19.107795277Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 11:32:19.107981 env[1193]: time="2024-07-02T11:32:19.107950378Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 11:32:19.108214 env[1193]: time="2024-07-02T11:32:19.108183751Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.108347 env[1193]: time="2024-07-02T11:32:19.108315748Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.108486 env[1193]: time="2024-07-02T11:32:19.108456214Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.108622 env[1193]: time="2024-07-02T11:32:19.108593341Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.108873 env[1193]: time="2024-07-02T11:32:19.108843120Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.109072 env[1193]: time="2024-07-02T11:32:19.109042369Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.109213 env[1193]: time="2024-07-02T11:32:19.109184120Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.109479 env[1193]: time="2024-07-02T11:32:19.109444255Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.109694 env[1193]: time="2024-07-02T11:32:19.109648349Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 11:32:19.110000 env[1193]: time="2024-07-02T11:32:19.109970973Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 11:32:19.110315 env[1193]: time="2024-07-02T11:32:19.110285777Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 11:32:19.110927 env[1193]: time="2024-07-02T11:32:19.110894752Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 11:32:19.111145 env[1193]: time="2024-07-02T11:32:19.111114700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.111269 env[1193]: time="2024-07-02T11:32:19.111239361Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 11:32:19.111495 env[1193]: time="2024-07-02T11:32:19.111464785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.111936 env[1193]: time="2024-07-02T11:32:19.111905848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.112154 env[1193]: time="2024-07-02T11:32:19.112123763Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.112362 env[1193]: time="2024-07-02T11:32:19.112332095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.112605 env[1193]: time="2024-07-02T11:32:19.112575724Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.113447 env[1193]: time="2024-07-02T11:32:19.113418218Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.113683 env[1193]: time="2024-07-02T11:32:19.113636979Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.113804 env[1193]: time="2024-07-02T11:32:19.113775663Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.113943 env[1193]: time="2024-07-02T11:32:19.113914334Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 11:32:19.114291 env[1193]: time="2024-07-02T11:32:19.114260990Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.115182 env[1193]: time="2024-07-02T11:32:19.114720529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.115307 env[1193]: time="2024-07-02T11:32:19.115277674Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.115456 env[1193]: time="2024-07-02T11:32:19.115424622Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 11:32:19.115581 env[1193]: time="2024-07-02T11:32:19.115549445Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 11:32:19.115722 env[1193]: time="2024-07-02T11:32:19.115692554Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 11:32:19.116359 env[1193]: time="2024-07-02T11:32:19.116323725Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 11:32:19.119465 env[1193]: time="2024-07-02T11:32:19.119427149Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 11:32:19.120956 env[1193]: time="2024-07-02T11:32:19.120871323Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 11:32:19.123426 env[1193]: time="2024-07-02T11:32:19.121260480Z" level=info msg="Connect containerd service" Jul 2 11:32:19.123426 env[1193]: time="2024-07-02T11:32:19.121344870Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 11:32:19.125733 env[1193]: time="2024-07-02T11:32:19.125695977Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 11:32:19.129263 systemd-hostnamed[1208]: Hostname set to (static) Jul 2 11:32:19.130802 env[1193]: time="2024-07-02T11:32:19.130763302Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 11:32:19.130881 env[1193]: time="2024-07-02T11:32:19.130859022Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 11:32:19.131053 systemd[1]: Started containerd.service. Jul 2 11:32:19.136516 env[1193]: time="2024-07-02T11:32:19.136303462Z" level=info msg="containerd successfully booted in 0.226017s" Jul 2 11:32:19.137182 env[1193]: time="2024-07-02T11:32:19.137129381Z" level=info msg="Start subscribing containerd event" Jul 2 11:32:19.137254 env[1193]: time="2024-07-02T11:32:19.137227800Z" level=info msg="Start recovering state" Jul 2 11:32:19.137411 env[1193]: time="2024-07-02T11:32:19.137369969Z" level=info msg="Start event monitor" Jul 2 11:32:19.137490 env[1193]: time="2024-07-02T11:32:19.137438905Z" level=info msg="Start snapshots syncer" Jul 2 11:32:19.137543 env[1193]: time="2024-07-02T11:32:19.137505480Z" level=info msg="Start cni network conf syncer for default" Jul 2 11:32:19.137543 env[1193]: time="2024-07-02T11:32:19.137529471Z" level=info msg="Start streaming server" Jul 2 11:32:19.544590 tar[1192]: linux-amd64/LICENSE Jul 2 11:32:19.544842 tar[1192]: linux-amd64/README.md Jul 2 11:32:19.551391 systemd[1]: Finished prepare-helm.service. Jul 2 11:32:19.731594 locksmithd[1232]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 11:32:20.004046 systemd[1]: Started kubelet.service. Jul 2 11:32:20.213813 systemd-networkd[1032]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8fb3:24:19ff:fee6:3ece/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8fb3:24:19ff:fee6:3ece/64 assigned by NDisc. Jul 2 11:32:20.213827 systemd-networkd[1032]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Jul 2 11:32:20.459285 sshd_keygen[1202]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 11:32:20.487210 systemd[1]: Finished sshd-keygen.service. Jul 2 11:32:20.490551 systemd[1]: Starting issuegen.service... Jul 2 11:32:20.498460 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 11:32:20.498744 systemd[1]: Finished issuegen.service. Jul 2 11:32:20.501445 systemd[1]: Starting systemd-user-sessions.service... Jul 2 11:32:20.514006 systemd[1]: Finished systemd-user-sessions.service. Jul 2 11:32:20.517036 systemd[1]: Started getty@tty1.service. Jul 2 11:32:20.520042 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 11:32:20.521357 systemd[1]: Reached target getty.target. Jul 2 11:32:20.803690 kubelet[1254]: E0702 11:32:20.803488 1254 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 11:32:20.806881 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 11:32:20.807126 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 11:32:20.807587 systemd[1]: kubelet.service: Consumed 1.146s CPU time. Jul 2 11:32:25.671770 coreos-metadata[1174]: Jul 02 11:32:25.671 WARN failed to locate config-drive, using the metadata service API instead Jul 2 11:32:25.726900 coreos-metadata[1174]: Jul 02 11:32:25.726 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Jul 2 11:32:25.774344 coreos-metadata[1174]: Jul 02 11:32:25.774 INFO Fetch successful Jul 2 11:32:25.774540 coreos-metadata[1174]: Jul 02 11:32:25.774 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 2 11:32:25.826355 coreos-metadata[1174]: Jul 02 11:32:25.826 INFO Fetch successful Jul 2 11:32:25.828099 unknown[1174]: wrote ssh authorized keys file for user: core Jul 2 11:32:25.839796 update-ssh-keys[1278]: Updated "/home/core/.ssh/authorized_keys" Jul 2 11:32:25.840789 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 11:32:25.841313 systemd[1]: Reached target multi-user.target. Jul 2 11:32:25.843568 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 11:32:25.853466 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 11:32:25.853885 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 11:32:25.854522 systemd[1]: Startup finished in 1.147s (kernel) + 8.516s (initrd) + 13.906s (userspace) = 23.570s. Jul 2 11:32:28.416646 systemd[1]: Created slice system-sshd.slice. Jul 2 11:32:28.420812 systemd[1]: Started sshd@0-10.230.62.206:22-147.75.109.163:55538.service. Jul 2 11:32:29.306770 sshd[1281]: Accepted publickey for core from 147.75.109.163 port 55538 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:32:29.309107 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:32:29.331373 systemd[1]: Created slice user-500.slice. Jul 2 11:32:29.335169 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 11:32:29.342964 systemd-logind[1186]: New session 1 of user core. Jul 2 11:32:29.356154 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 11:32:29.361078 systemd[1]: Starting user@500.service... Jul 2 11:32:29.366629 (systemd)[1284]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:32:29.497014 systemd[1284]: Queued start job for default target default.target. Jul 2 11:32:29.499910 systemd[1284]: Reached target paths.target. Jul 2 11:32:29.500224 systemd[1284]: Reached target sockets.target. Jul 2 11:32:29.500448 systemd[1284]: Reached target timers.target. Jul 2 11:32:29.500645 systemd[1284]: Reached target basic.target. Jul 2 11:32:29.501009 systemd[1]: Started user@500.service. Jul 2 11:32:29.504317 systemd[1]: Started session-1.scope. Jul 2 11:32:29.505305 systemd[1284]: Reached target default.target. Jul 2 11:32:29.505407 systemd[1284]: Startup finished in 128ms. Jul 2 11:32:30.119969 systemd[1]: Started sshd@1-10.230.62.206:22-147.75.109.163:55548.service. Jul 2 11:32:30.844108 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 11:32:30.844641 systemd[1]: Stopped kubelet.service. Jul 2 11:32:30.844746 systemd[1]: kubelet.service: Consumed 1.146s CPU time. Jul 2 11:32:30.847781 systemd[1]: Starting kubelet.service... Jul 2 11:32:30.993561 sshd[1293]: Accepted publickey for core from 147.75.109.163 port 55548 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:32:30.996803 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:32:31.005715 systemd[1]: Started session-2.scope. Jul 2 11:32:31.007731 systemd-logind[1186]: New session 2 of user core. Jul 2 11:32:31.030290 systemd[1]: Started kubelet.service. Jul 2 11:32:31.121305 kubelet[1300]: E0702 11:32:31.121093 1300 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 11:32:31.126661 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 11:32:31.126922 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 11:32:31.612169 sshd[1293]: pam_unix(sshd:session): session closed for user core Jul 2 11:32:31.618628 systemd-logind[1186]: Session 2 logged out. Waiting for processes to exit. Jul 2 11:32:31.620077 systemd[1]: sshd@1-10.230.62.206:22-147.75.109.163:55548.service: Deactivated successfully. Jul 2 11:32:31.621654 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 11:32:31.622898 systemd-logind[1186]: Removed session 2. Jul 2 11:32:31.757562 systemd[1]: Started sshd@2-10.230.62.206:22-147.75.109.163:55550.service. Jul 2 11:32:32.631575 sshd[1309]: Accepted publickey for core from 147.75.109.163 port 55550 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:32:32.633831 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:32:32.642556 systemd-logind[1186]: New session 3 of user core. Jul 2 11:32:32.642566 systemd[1]: Started session-3.scope. Jul 2 11:32:33.237547 sshd[1309]: pam_unix(sshd:session): session closed for user core Jul 2 11:32:33.241971 systemd-logind[1186]: Session 3 logged out. Waiting for processes to exit. Jul 2 11:32:33.242414 systemd[1]: sshd@2-10.230.62.206:22-147.75.109.163:55550.service: Deactivated successfully. Jul 2 11:32:33.243404 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 11:32:33.244582 systemd-logind[1186]: Removed session 3. Jul 2 11:32:33.381645 systemd[1]: Started sshd@3-10.230.62.206:22-147.75.109.163:42380.service. Jul 2 11:32:34.252309 sshd[1315]: Accepted publickey for core from 147.75.109.163 port 42380 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:32:34.254552 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:32:34.261437 systemd-logind[1186]: New session 4 of user core. Jul 2 11:32:34.262398 systemd[1]: Started session-4.scope. Jul 2 11:32:34.865784 sshd[1315]: pam_unix(sshd:session): session closed for user core Jul 2 11:32:34.870557 systemd-logind[1186]: Session 4 logged out. Waiting for processes to exit. Jul 2 11:32:34.871289 systemd[1]: sshd@3-10.230.62.206:22-147.75.109.163:42380.service: Deactivated successfully. Jul 2 11:32:34.872494 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 11:32:34.873655 systemd-logind[1186]: Removed session 4. Jul 2 11:32:35.010706 systemd[1]: Started sshd@4-10.230.62.206:22-147.75.109.163:42394.service. Jul 2 11:32:35.884912 sshd[1321]: Accepted publickey for core from 147.75.109.163 port 42394 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:32:35.887876 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:32:35.895150 systemd-logind[1186]: New session 5 of user core. Jul 2 11:32:35.896097 systemd[1]: Started session-5.scope. Jul 2 11:32:36.367625 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 11:32:36.369179 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 11:32:36.377950 dbus-daemon[1175]: \xd0\u001d\u001e\xa0ZU: received setenforce notice (enforcing=1563647408) Jul 2 11:32:36.380247 sudo[1324]: pam_unix(sudo:session): session closed for user root Jul 2 11:32:36.522344 sshd[1321]: pam_unix(sshd:session): session closed for user core Jul 2 11:32:36.526866 systemd-logind[1186]: Session 5 logged out. Waiting for processes to exit. Jul 2 11:32:36.527379 systemd[1]: sshd@4-10.230.62.206:22-147.75.109.163:42394.service: Deactivated successfully. Jul 2 11:32:36.528497 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 11:32:36.529637 systemd-logind[1186]: Removed session 5. Jul 2 11:32:36.666966 systemd[1]: Started sshd@5-10.230.62.206:22-147.75.109.163:42404.service. Jul 2 11:32:37.536616 sshd[1328]: Accepted publickey for core from 147.75.109.163 port 42404 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:32:37.539470 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:32:37.547061 systemd[1]: Started session-6.scope. Jul 2 11:32:37.548757 systemd-logind[1186]: New session 6 of user core. Jul 2 11:32:38.006628 sudo[1332]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 11:32:38.007658 sudo[1332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 11:32:38.012350 sudo[1332]: pam_unix(sudo:session): session closed for user root Jul 2 11:32:38.019669 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 11:32:38.020079 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 11:32:38.035312 systemd[1]: Stopping audit-rules.service... Jul 2 11:32:38.036000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 11:32:38.038593 kernel: kauditd_printk_skb: 171 callbacks suppressed Jul 2 11:32:38.038762 kernel: audit: type=1305 audit(1719919958.036:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 11:32:38.036000 audit[1335]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe524e83d0 a2=420 a3=0 items=0 ppid=1 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:38.049112 kernel: audit: type=1300 audit(1719919958.036:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe524e83d0 a2=420 a3=0 items=0 ppid=1 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:38.049228 kernel: audit: type=1327 audit(1719919958.036:208): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 11:32:38.036000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 11:32:38.051730 auditctl[1335]: No rules Jul 2 11:32:38.052119 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 11:32:38.052388 systemd[1]: Stopped audit-rules.service. Jul 2 11:32:38.058017 kernel: audit: type=1131 audit(1719919958.051:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.057814 systemd[1]: Starting audit-rules.service... Jul 2 11:32:38.081590 augenrules[1352]: No rules Jul 2 11:32:38.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.085317 sudo[1331]: pam_unix(sudo:session): session closed for user root Jul 2 11:32:38.082835 systemd[1]: Finished audit-rules.service. Jul 2 11:32:38.084000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.096718 kernel: audit: type=1130 audit(1719919958.082:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.096835 kernel: audit: type=1106 audit(1719919958.084:211): pid=1331 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.096893 kernel: audit: type=1104 audit(1719919958.084:212): pid=1331 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.084000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.226503 sshd[1328]: pam_unix(sshd:session): session closed for user core Jul 2 11:32:38.228000 audit[1328]: USER_END pid=1328 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:32:38.230923 systemd[1]: sshd@5-10.230.62.206:22-147.75.109.163:42404.service: Deactivated successfully. Jul 2 11:32:38.232036 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 11:32:38.228000 audit[1328]: CRED_DISP pid=1328 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:32:38.243742 kernel: audit: type=1106 audit(1719919958.228:213): pid=1328 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:32:38.243871 kernel: audit: type=1104 audit(1719919958.228:214): pid=1328 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:32:38.243834 systemd-logind[1186]: Session 6 logged out. Waiting for processes to exit. Jul 2 11:32:38.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.230.62.206:22-147.75.109.163:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.250452 kernel: audit: type=1131 audit(1719919958.230:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.230.62.206:22-147.75.109.163:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:38.250992 systemd-logind[1186]: Removed session 6. Jul 2 11:32:38.369065 systemd[1]: Started sshd@6-10.230.62.206:22-147.75.109.163:42408.service. Jul 2 11:32:38.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.62.206:22-147.75.109.163:42408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:39.230000 audit[1358]: USER_ACCT pid=1358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:32:39.231985 sshd[1358]: Accepted publickey for core from 147.75.109.163 port 42408 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:32:39.232000 audit[1358]: CRED_ACQ pid=1358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:32:39.232000 audit[1358]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb228b880 a2=3 a3=0 items=0 ppid=1 pid=1358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:39.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:32:39.234055 sshd[1358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:32:39.241049 systemd-logind[1186]: New session 7 of user core. Jul 2 11:32:39.242305 systemd[1]: Started session-7.scope. Jul 2 11:32:39.249000 audit[1358]: USER_START pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:32:39.252000 audit[1360]: CRED_ACQ pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:32:39.694000 audit[1361]: USER_ACCT pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:32:39.696080 sudo[1361]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 11:32:39.696000 audit[1361]: CRED_REFR pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:32:39.697185 sudo[1361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 11:32:39.699000 audit[1361]: USER_START pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:32:39.753254 systemd[1]: Starting docker.service... Jul 2 11:32:39.837352 env[1371]: time="2024-07-02T11:32:39.837172102Z" level=info msg="Starting up" Jul 2 11:32:39.840633 env[1371]: time="2024-07-02T11:32:39.840599633Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 11:32:39.840788 env[1371]: time="2024-07-02T11:32:39.840757972Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 11:32:39.840955 env[1371]: time="2024-07-02T11:32:39.840920894Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 11:32:39.841098 env[1371]: time="2024-07-02T11:32:39.841057991Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 11:32:39.851051 env[1371]: time="2024-07-02T11:32:39.850981798Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 11:32:39.851051 env[1371]: time="2024-07-02T11:32:39.851035501Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 11:32:39.851291 env[1371]: time="2024-07-02T11:32:39.851067280Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 11:32:39.851291 env[1371]: time="2024-07-02T11:32:39.851085722Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 11:32:39.861285 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1971967036-merged.mount: Deactivated successfully. Jul 2 11:32:39.907898 env[1371]: time="2024-07-02T11:32:39.907818397Z" level=info msg="Loading containers: start." Jul 2 11:32:40.004000 audit[1404]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.004000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe05610e60 a2=0 a3=7ffe05610e4c items=0 ppid=1371 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.004000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 11:32:40.008000 audit[1406]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.008000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcaaaaa4d0 a2=0 a3=7ffcaaaaa4bc items=0 ppid=1371 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.008000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 11:32:40.011000 audit[1408]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.011000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffebafbcef0 a2=0 a3=7ffebafbcedc items=0 ppid=1371 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.011000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 11:32:40.014000 audit[1410]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.014000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe8f6ea6c0 a2=0 a3=7ffe8f6ea6ac items=0 ppid=1371 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.014000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 11:32:40.018000 audit[1412]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.018000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc1aa8cd0 a2=0 a3=7ffdc1aa8cbc items=0 ppid=1371 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 11:32:40.043000 audit[1417]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.043000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5e608580 a2=0 a3=7ffe5e60856c items=0 ppid=1371 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.043000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 11:32:40.052000 audit[1419]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.052000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffffcfcc560 a2=0 a3=7ffffcfcc54c items=0 ppid=1371 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 11:32:40.056000 audit[1421]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.056000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff8758f6a0 a2=0 a3=7fff8758f68c items=0 ppid=1371 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.056000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 11:32:40.059000 audit[1423]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.059000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcc157e880 a2=0 a3=7ffcc157e86c items=0 ppid=1371 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.059000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:32:40.069000 audit[1427]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.069000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeb7c9e300 a2=0 a3=7ffeb7c9e2ec items=0 ppid=1371 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.069000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:32:40.070000 audit[1428]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.070000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffebd9cb7e0 a2=0 a3=7ffebd9cb7cc items=0 ppid=1371 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.070000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:32:40.090196 kernel: Initializing XFRM netlink socket Jul 2 11:32:40.144999 env[1371]: time="2024-07-02T11:32:40.144937456Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 11:32:40.190000 audit[1436]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.190000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc8e9eec30 a2=0 a3=7ffc8e9eec1c items=0 ppid=1371 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.190000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 11:32:40.206000 audit[1439]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.206000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdd5c78230 a2=0 a3=7ffdd5c7821c items=0 ppid=1371 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 11:32:40.211000 audit[1442]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.211000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff4c0a2720 a2=0 a3=7fff4c0a270c items=0 ppid=1371 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 11:32:40.216000 audit[1444]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.216000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcc7b8e8d0 a2=0 a3=7ffcc7b8e8bc items=0 ppid=1371 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.216000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 11:32:40.221000 audit[1446]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.221000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffeabed24c0 a2=0 a3=7ffeabed24ac items=0 ppid=1371 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.221000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 11:32:40.226000 audit[1448]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.226000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff70620060 a2=0 a3=7fff7062004c items=0 ppid=1371 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 11:32:40.231000 audit[1450]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.231000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcbca59f30 a2=0 a3=7ffcbca59f1c items=0 ppid=1371 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 11:32:40.245000 audit[1453]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.245000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd69dc5ae0 a2=0 a3=7ffd69dc5acc items=0 ppid=1371 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.245000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 11:32:40.249000 audit[1455]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.249000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffff7ec31b0 a2=0 a3=7ffff7ec319c items=0 ppid=1371 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 11:32:40.253000 audit[1457]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.253000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcbce4fd00 a2=0 a3=7ffcbce4fcec items=0 ppid=1371 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.253000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 11:32:40.256000 audit[1459]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.256000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff8be617b0 a2=0 a3=7fff8be6179c items=0 ppid=1371 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.256000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 11:32:40.260144 systemd-networkd[1032]: docker0: Link UP Jul 2 11:32:40.268000 audit[1463]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.268000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe1eaecdd0 a2=0 a3=7ffe1eaecdbc items=0 ppid=1371 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.268000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:32:40.270000 audit[1464]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:32:40.270000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffde6a7edb0 a2=0 a3=7ffde6a7ed9c items=0 ppid=1371 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:32:40.270000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:32:40.271911 env[1371]: time="2024-07-02T11:32:40.271857731Z" level=info msg="Loading containers: done." Jul 2 11:32:40.293560 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck396228965-merged.mount: Deactivated successfully. Jul 2 11:32:40.302789 env[1371]: time="2024-07-02T11:32:40.302709986Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 11:32:40.303120 env[1371]: time="2024-07-02T11:32:40.303069629Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 11:32:40.303320 env[1371]: time="2024-07-02T11:32:40.303274442Z" level=info msg="Daemon has completed initialization" Jul 2 11:32:40.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:40.321948 systemd[1]: Started docker.service. Jul 2 11:32:40.329354 env[1371]: time="2024-07-02T11:32:40.329282302Z" level=info msg="API listen on /run/docker.sock" Jul 2 11:32:41.378490 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 11:32:41.378919 systemd[1]: Stopped kubelet.service. Jul 2 11:32:41.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:41.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:41.382376 systemd[1]: Starting kubelet.service... Jul 2 11:32:41.543289 systemd[1]: Started kubelet.service. Jul 2 11:32:41.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:41.619960 kubelet[1502]: E0702 11:32:41.619862 1502 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 11:32:41.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 11:32:41.622545 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 11:32:41.622837 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 11:32:41.800639 env[1193]: time="2024-07-02T11:32:41.799822025Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\"" Jul 2 11:32:42.663907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1296731158.mount: Deactivated successfully. Jul 2 11:32:45.449367 env[1193]: time="2024-07-02T11:32:45.449295257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:45.453629 env[1193]: time="2024-07-02T11:32:45.453578317Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3af2ab51e136465590d968a2052e02e180fc7967a03724b269c1337e8f09d36f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:45.456144 env[1193]: time="2024-07-02T11:32:45.456105627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:45.458447 env[1193]: time="2024-07-02T11:32:45.458398083Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f4d993b3d73cc0d59558be584b5b40785b4a96874bc76873b69d1dd818485e70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:45.459820 env[1193]: time="2024-07-02T11:32:45.459777834Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\" returns image reference \"sha256:3af2ab51e136465590d968a2052e02e180fc7967a03724b269c1337e8f09d36f\"" Jul 2 11:32:45.479911 env[1193]: time="2024-07-02T11:32:45.479820338Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\"" Jul 2 11:32:48.505969 env[1193]: time="2024-07-02T11:32:48.505756410Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:48.510342 env[1193]: time="2024-07-02T11:32:48.510268172Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:083b81fc09e858d3e0d4b42f567a9d44a2232b60bac396a94cbdd7ce1098235e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:48.514179 env[1193]: time="2024-07-02T11:32:48.514134182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:48.517785 env[1193]: time="2024-07-02T11:32:48.517726775Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:692fc3f88a60b3afc76492ad347306d34042000f56f230959e9367fd59c48b1e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:48.519147 env[1193]: time="2024-07-02T11:32:48.519053860Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\" returns image reference \"sha256:083b81fc09e858d3e0d4b42f567a9d44a2232b60bac396a94cbdd7ce1098235e\"" Jul 2 11:32:48.539598 env[1193]: time="2024-07-02T11:32:48.539553409Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\"" Jul 2 11:32:50.271946 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 11:32:50.272353 kernel: audit: type=1131 audit(1719919970.259:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:50.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:50.259990 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 11:32:50.286000 audit: BPF prog-id=43 op=UNLOAD Jul 2 11:32:50.286000 audit: BPF prog-id=42 op=UNLOAD Jul 2 11:32:50.290449 kernel: audit: type=1334 audit(1719919970.286:255): prog-id=43 op=UNLOAD Jul 2 11:32:50.290542 kernel: audit: type=1334 audit(1719919970.286:256): prog-id=42 op=UNLOAD Jul 2 11:32:50.290603 kernel: audit: type=1334 audit(1719919970.286:257): prog-id=41 op=UNLOAD Jul 2 11:32:50.286000 audit: BPF prog-id=41 op=UNLOAD Jul 2 11:32:50.554875 env[1193]: time="2024-07-02T11:32:50.554622536Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:50.558771 env[1193]: time="2024-07-02T11:32:50.558723730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:49d9b8328a8fda6ebca6b3226c6d722d92ec7adffff18668511a88058444cf15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:50.561536 env[1193]: time="2024-07-02T11:32:50.561497312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:50.564170 env[1193]: time="2024-07-02T11:32:50.564130465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b91a4e45debd0d5336d9f533aefdf47d4b39b24071feb459e521709b9e4ec24f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:50.565410 env[1193]: time="2024-07-02T11:32:50.565322939Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\" returns image reference \"sha256:49d9b8328a8fda6ebca6b3226c6d722d92ec7adffff18668511a88058444cf15\"" Jul 2 11:32:50.586081 env[1193]: time="2024-07-02T11:32:50.586023580Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\"" Jul 2 11:32:51.697642 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 11:32:51.698033 systemd[1]: Stopped kubelet.service. Jul 2 11:32:51.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:51.709332 kernel: audit: type=1130 audit(1719919971.697:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:51.709469 kernel: audit: type=1131 audit(1719919971.697:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:51.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:51.704390 systemd[1]: Starting kubelet.service... Jul 2 11:32:51.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:51.937859 systemd[1]: Started kubelet.service. Jul 2 11:32:51.944701 kernel: audit: type=1130 audit(1719919971.937:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:32:52.045807 kubelet[1539]: E0702 11:32:52.045613 1539 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 11:32:52.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 11:32:52.048860 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 11:32:52.049110 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 11:32:52.055707 kernel: audit: type=1131 audit(1719919972.048:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 11:32:52.663175 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3677976465.mount: Deactivated successfully. Jul 2 11:32:53.618412 env[1193]: time="2024-07-02T11:32:53.618320969Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:53.620689 env[1193]: time="2024-07-02T11:32:53.620620913Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:53.622807 env[1193]: time="2024-07-02T11:32:53.622750499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:53.625408 env[1193]: time="2024-07-02T11:32:53.625370675Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:88bacb3e1d6c0c37c6da95c6d6b8e30531d0b4d0ab540cc290b0af51fbfebd90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:53.628503 env[1193]: time="2024-07-02T11:32:53.628452853Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\" returns image reference \"sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9\"" Jul 2 11:32:53.644448 env[1193]: time="2024-07-02T11:32:53.644400846Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 11:32:54.332800 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3767974516.mount: Deactivated successfully. Jul 2 11:32:55.887218 env[1193]: time="2024-07-02T11:32:55.886998279Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:55.896037 env[1193]: time="2024-07-02T11:32:55.895948399Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:55.898256 env[1193]: time="2024-07-02T11:32:55.898212828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:55.901881 env[1193]: time="2024-07-02T11:32:55.901829636Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:55.903132 env[1193]: time="2024-07-02T11:32:55.903093509Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Jul 2 11:32:55.920214 env[1193]: time="2024-07-02T11:32:55.920158736Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 11:32:56.514237 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1621699894.mount: Deactivated successfully. Jul 2 11:32:56.535012 env[1193]: time="2024-07-02T11:32:56.534933887Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:56.537265 env[1193]: time="2024-07-02T11:32:56.537224839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:56.539417 env[1193]: time="2024-07-02T11:32:56.539382790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:56.541322 env[1193]: time="2024-07-02T11:32:56.541282055Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:32:56.542225 env[1193]: time="2024-07-02T11:32:56.542188716Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 11:32:56.555704 env[1193]: time="2024-07-02T11:32:56.555626211Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Jul 2 11:32:57.239523 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3930131857.mount: Deactivated successfully. Jul 2 11:33:02.197731 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 2 11:33:02.207788 kernel: audit: type=1130 audit(1719919982.197:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:02.207981 kernel: audit: type=1131 audit(1719919982.197:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:02.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:02.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:02.198244 systemd[1]: Stopped kubelet.service. Jul 2 11:33:02.203826 systemd[1]: Starting kubelet.service... Jul 2 11:33:02.217083 env[1193]: time="2024-07-02T11:33:02.217006620Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:02.221767 env[1193]: time="2024-07-02T11:33:02.221715712Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:02.226320 env[1193]: time="2024-07-02T11:33:02.226281018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:02.230157 env[1193]: time="2024-07-02T11:33:02.230121886Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:02.232957 env[1193]: time="2024-07-02T11:33:02.232884327Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Jul 2 11:33:02.932732 systemd[1]: Started kubelet.service. Jul 2 11:33:02.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:02.940686 kernel: audit: type=1130 audit(1719919982.932:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:03.037799 kubelet[1571]: E0702 11:33:03.037720 1571 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 11:33:03.039638 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 11:33:03.039929 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 11:33:03.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 11:33:03.046721 kernel: audit: type=1131 audit(1719919983.039:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 11:33:04.298234 update_engine[1189]: I0702 11:33:04.298064 1189 update_attempter.cc:509] Updating boot flags... Jul 2 11:33:06.493584 systemd[1]: Stopped kubelet.service. Jul 2 11:33:06.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:06.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:06.502413 systemd[1]: Starting kubelet.service... Jul 2 11:33:06.505458 kernel: audit: type=1130 audit(1719919986.494:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:06.505598 kernel: audit: type=1131 audit(1719919986.494:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:06.534363 systemd[1]: Reloading. Jul 2 11:33:06.702373 /usr/lib/systemd/system-generators/torcx-generator[1671]: time="2024-07-02T11:33:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 11:33:06.702427 /usr/lib/systemd/system-generators/torcx-generator[1671]: time="2024-07-02T11:33:06Z" level=info msg="torcx already run" Jul 2 11:33:06.821582 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 11:33:06.821626 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 11:33:06.850615 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 11:33:06.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959572 kernel: audit: type=1400 audit(1719919986.949:268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959740 kernel: audit: type=1400 audit(1719919986.949:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966739 kernel: audit: type=1400 audit(1719919986.959:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.972737 kernel: audit: type=1400 audit(1719919986.959:271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966000 audit: BPF prog-id=46 op=LOAD Jul 2 11:33:06.966000 audit: BPF prog-id=27 op=UNLOAD Jul 2 11:33:06.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit: BPF prog-id=47 op=LOAD Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.971000 audit: BPF prog-id=48 op=LOAD Jul 2 11:33:06.971000 audit: BPF prog-id=28 op=UNLOAD Jul 2 11:33:06.971000 audit: BPF prog-id=29 op=UNLOAD Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit: BPF prog-id=49 op=LOAD Jul 2 11:33:06.974000 audit: BPF prog-id=38 op=UNLOAD Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit: BPF prog-id=50 op=LOAD Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.974000 audit: BPF prog-id=51 op=LOAD Jul 2 11:33:06.974000 audit: BPF prog-id=39 op=UNLOAD Jul 2 11:33:06.974000 audit: BPF prog-id=40 op=UNLOAD Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit: BPF prog-id=52 op=LOAD Jul 2 11:33:06.975000 audit: BPF prog-id=30 op=UNLOAD Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit: BPF prog-id=53 op=LOAD Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.975000 audit: BPF prog-id=54 op=LOAD Jul 2 11:33:06.975000 audit: BPF prog-id=31 op=UNLOAD Jul 2 11:33:06.975000 audit: BPF prog-id=32 op=UNLOAD Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.976000 audit: BPF prog-id=55 op=LOAD Jul 2 11:33:06.976000 audit: BPF prog-id=33 op=UNLOAD Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.978000 audit: BPF prog-id=56 op=LOAD Jul 2 11:33:06.978000 audit: BPF prog-id=44 op=UNLOAD Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.982000 audit: BPF prog-id=57 op=LOAD Jul 2 11:33:06.982000 audit: BPF prog-id=36 op=UNLOAD Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit: BPF prog-id=58 op=LOAD Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.983000 audit: BPF prog-id=59 op=LOAD Jul 2 11:33:06.983000 audit: BPF prog-id=34 op=UNLOAD Jul 2 11:33:06.983000 audit: BPF prog-id=35 op=UNLOAD Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:06.988000 audit: BPF prog-id=60 op=LOAD Jul 2 11:33:06.988000 audit: BPF prog-id=37 op=UNLOAD Jul 2 11:33:07.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:07.021073 systemd[1]: Started kubelet.service. Jul 2 11:33:07.032378 systemd[1]: Stopping kubelet.service... Jul 2 11:33:07.033354 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 11:33:07.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:07.033608 systemd[1]: Stopped kubelet.service. Jul 2 11:33:07.036293 systemd[1]: Starting kubelet.service... Jul 2 11:33:07.272320 systemd[1]: Started kubelet.service. Jul 2 11:33:07.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:07.279866 kernel: kauditd_printk_skb: 170 callbacks suppressed Jul 2 11:33:07.279987 kernel: audit: type=1130 audit(1719919987.272:442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:07.377937 kubelet[1730]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 11:33:07.377937 kubelet[1730]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 11:33:07.377937 kubelet[1730]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 11:33:07.584987 kubelet[1730]: I0702 11:33:07.584378 1730 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 11:33:07.986759 kubelet[1730]: I0702 11:33:07.986712 1730 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 11:33:07.986759 kubelet[1730]: I0702 11:33:07.986753 1730 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 11:33:07.987105 kubelet[1730]: I0702 11:33:07.987074 1730 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 11:33:08.024169 kubelet[1730]: E0702 11:33:08.024136 1730 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.230.62.206:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.025642 kubelet[1730]: I0702 11:33:08.025609 1730 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 11:33:08.046034 kubelet[1730]: I0702 11:33:08.045999 1730 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 11:33:08.046691 kubelet[1730]: I0702 11:33:08.046654 1730 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 11:33:08.047194 kubelet[1730]: I0702 11:33:08.047164 1730 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 11:33:08.048214 kubelet[1730]: I0702 11:33:08.048186 1730 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 11:33:08.048358 kubelet[1730]: I0702 11:33:08.048333 1730 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 11:33:08.048651 kubelet[1730]: I0702 11:33:08.048627 1730 state_mem.go:36] "Initialized new in-memory state store" Jul 2 11:33:08.049002 kubelet[1730]: I0702 11:33:08.048979 1730 kubelet.go:396] "Attempting to sync node with API server" Jul 2 11:33:08.049158 kubelet[1730]: I0702 11:33:08.049127 1730 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 11:33:08.049331 kubelet[1730]: I0702 11:33:08.049307 1730 kubelet.go:312] "Adding apiserver pod source" Jul 2 11:33:08.049506 kubelet[1730]: I0702 11:33:08.049471 1730 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 11:33:08.052965 kubelet[1730]: W0702 11:33:08.052908 1730 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.230.62.206:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-z4l15.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.053141 kubelet[1730]: E0702 11:33:08.053115 1730 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.230.62.206:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-z4l15.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.053399 kubelet[1730]: I0702 11:33:08.053372 1730 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 11:33:08.059411 kubelet[1730]: I0702 11:33:08.059383 1730 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 11:33:08.059660 kubelet[1730]: W0702 11:33:08.059636 1730 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 11:33:08.060786 kubelet[1730]: I0702 11:33:08.060750 1730 server.go:1256] "Started kubelet" Jul 2 11:33:08.063342 kubelet[1730]: W0702 11:33:08.063022 1730 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.230.62.206:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.063342 kubelet[1730]: E0702 11:33:08.063078 1730 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.230.62.206:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.063342 kubelet[1730]: I0702 11:33:08.063221 1730 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 11:33:08.065006 kubelet[1730]: I0702 11:33:08.064647 1730 server.go:461] "Adding debug handlers to kubelet server" Jul 2 11:33:08.066747 kubelet[1730]: I0702 11:33:08.066721 1730 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 11:33:08.067241 kubelet[1730]: I0702 11:33:08.067218 1730 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 11:33:08.067000 audit[1730]: AVC avc: denied { mac_admin } for pid=1730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:08.075108 kubelet[1730]: I0702 11:33:08.075066 1730 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 11:33:08.075829 kernel: audit: type=1400 audit(1719919988.067:443): avc: denied { mac_admin } for pid=1730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:08.075964 kernel: audit: type=1401 audit(1719919988.067:443): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:08.067000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:08.076143 kubelet[1730]: I0702 11:33:08.075131 1730 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 11:33:08.067000 audit[1730]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5f0e0 a1=c000810e58 a2=c000b5f0b0 a3=25 items=0 ppid=1 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.086488 kernel: audit: type=1300 audit(1719919988.067:443): arch=c000003e syscall=188 success=no exit=-22 a0=c000b5f0e0 a1=c000810e58 a2=c000b5f0b0 a3=25 items=0 ppid=1 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.086580 kernel: audit: type=1327 audit(1719919988.067:443): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:08.067000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:08.087869 kubelet[1730]: E0702 11:33:08.087820 1730 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.62.206:6443/api/v1/namespaces/default/events\": dial tcp 10.230.62.206:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-z4l15.gb1.brightbox.com.17de621dda73f5f6 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-z4l15.gb1.brightbox.com,UID:srv-z4l15.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-z4l15.gb1.brightbox.com,},FirstTimestamp:2024-07-02 11:33:08.060714486 +0000 UTC m=+0.771906123,LastTimestamp:2024-07-02 11:33:08.060714486 +0000 UTC m=+0.771906123,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-z4l15.gb1.brightbox.com,}" Jul 2 11:33:08.089957 kubelet[1730]: E0702 11:33:08.089932 1730 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 11:33:08.074000 audit[1730]: AVC avc: denied { mac_admin } for pid=1730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:08.098543 kernel: audit: type=1400 audit(1719919988.074:444): avc: denied { mac_admin } for pid=1730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:08.099162 kubelet[1730]: I0702 11:33:08.099103 1730 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 11:33:08.099407 kubelet[1730]: I0702 11:33:08.099380 1730 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 11:33:08.099742 kubelet[1730]: I0702 11:33:08.099716 1730 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 11:33:08.099998 kubelet[1730]: I0702 11:33:08.099974 1730 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 11:33:08.074000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:08.101886 kubelet[1730]: W0702 11:33:08.101824 1730 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.230.62.206:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.102045 kubelet[1730]: E0702 11:33:08.102021 1730 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.230.62.206:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.102251 kubelet[1730]: E0702 11:33:08.102226 1730 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.62.206:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-z4l15.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.62.206:6443: connect: connection refused" interval="200ms" Jul 2 11:33:08.103159 kubelet[1730]: I0702 11:33:08.103103 1730 factory.go:221] Registration of the systemd container factory successfully Jul 2 11:33:08.103455 kubelet[1730]: I0702 11:33:08.103408 1730 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 11:33:08.074000 audit[1730]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008f2c40 a1=c000810e70 a2=c000b5f170 a3=25 items=0 ppid=1 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.106079 kubelet[1730]: I0702 11:33:08.106057 1730 factory.go:221] Registration of the containerd container factory successfully Jul 2 11:33:08.111824 kernel: audit: type=1401 audit(1719919988.074:444): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:08.111949 kernel: audit: type=1300 audit(1719919988.074:444): arch=c000003e syscall=188 success=no exit=-22 a0=c0008f2c40 a1=c000810e70 a2=c000b5f170 a3=25 items=0 ppid=1 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.112012 kernel: audit: type=1327 audit(1719919988.074:444): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:08.074000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:08.119000 audit[1740]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.119000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd7cd8e80 a2=0 a3=7ffcd7cd8e6c items=0 ppid=1730 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.124751 kernel: audit: type=1325 audit(1719919988.119:445): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 11:33:08.125000 audit[1742]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.125000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe03ffa380 a2=0 a3=7ffe03ffa36c items=0 ppid=1730 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 11:33:08.131000 audit[1746]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.131000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe92ff46f0 a2=0 a3=7ffe92ff46dc items=0 ppid=1730 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 11:33:08.139000 audit[1749]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.139000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffdc82fe60 a2=0 a3=7fffdc82fe4c items=0 ppid=1730 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 11:33:08.147710 kubelet[1730]: I0702 11:33:08.147681 1730 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 11:33:08.148008 kubelet[1730]: I0702 11:33:08.147985 1730 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 11:33:08.148205 kubelet[1730]: I0702 11:33:08.148165 1730 state_mem.go:36] "Initialized new in-memory state store" Jul 2 11:33:08.163760 kubelet[1730]: I0702 11:33:08.163678 1730 policy_none.go:49] "None policy: Start" Jul 2 11:33:08.168655 kubelet[1730]: I0702 11:33:08.168630 1730 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 11:33:08.169011 kubelet[1730]: I0702 11:33:08.168988 1730 state_mem.go:35] "Initializing new in-memory state store" Jul 2 11:33:08.169000 audit[1754]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.169000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffef671c2d0 a2=0 a3=7ffef671c2bc items=0 ppid=1730 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 11:33:08.171086 kubelet[1730]: I0702 11:33:08.171054 1730 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 11:33:08.173000 audit[1755]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:08.173000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce79652a0 a2=0 a3=7ffce796528c items=0 ppid=1730 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 11:33:08.174555 kubelet[1730]: I0702 11:33:08.174531 1730 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 11:33:08.175277 kubelet[1730]: I0702 11:33:08.175239 1730 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 11:33:08.175385 kubelet[1730]: I0702 11:33:08.175294 1730 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 11:33:08.175385 kubelet[1730]: E0702 11:33:08.175379 1730 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 11:33:08.176000 audit[1756]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.176000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5476f950 a2=0 a3=7ffd5476f93c items=0 ppid=1730 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 11:33:08.178000 audit[1758]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:08.178000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc65108080 a2=0 a3=7ffc6510806c items=0 ppid=1730 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 11:33:08.179933 kubelet[1730]: W0702 11:33:08.177941 1730 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.230.62.206:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.179933 kubelet[1730]: E0702 11:33:08.178002 1730 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.230.62.206:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:08.179573 systemd[1]: Created slice kubepods.slice. Jul 2 11:33:08.181000 audit[1759]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.181000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0e8f5050 a2=0 a3=7ffe0e8f503c items=0 ppid=1730 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 11:33:08.182000 audit[1760]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:08.182000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffcb444db0 a2=0 a3=7fffcb444d9c items=0 ppid=1730 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 11:33:08.184000 audit[1761]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:08.184000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1864fa80 a2=0 a3=7ffd1864fa6c items=0 ppid=1730 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 11:33:08.185000 audit[1762]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:08.185000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb43b7ba0 a2=0 a3=7ffcb43b7b8c items=0 ppid=1730 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 11:33:08.189966 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 11:33:08.194271 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 11:33:08.202184 kubelet[1730]: I0702 11:33:08.202155 1730 kubelet_node_status.go:73] "Attempting to register node" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.202765 kubelet[1730]: E0702 11:33:08.202740 1730 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.62.206:6443/api/v1/nodes\": dial tcp 10.230.62.206:6443: connect: connection refused" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.203134 kubelet[1730]: I0702 11:33:08.203108 1730 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 11:33:08.203000 audit[1730]: AVC avc: denied { mac_admin } for pid=1730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:08.203000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:08.203000 audit[1730]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e54f00 a1=c000f2a000 a2=c000e54ed0 a3=25 items=0 ppid=1 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:08.203000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:08.204690 kubelet[1730]: I0702 11:33:08.204636 1730 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 11:33:08.205611 kubelet[1730]: I0702 11:33:08.205586 1730 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 11:33:08.209557 kubelet[1730]: E0702 11:33:08.209519 1730 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-z4l15.gb1.brightbox.com\" not found" Jul 2 11:33:08.275892 kubelet[1730]: I0702 11:33:08.275749 1730 topology_manager.go:215] "Topology Admit Handler" podUID="13510be88e2cf1e682f7d0ece3e1fb69" podNamespace="kube-system" podName="kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.283913 kubelet[1730]: I0702 11:33:08.283883 1730 topology_manager.go:215] "Topology Admit Handler" podUID="1412d230174e921a028c3fc966ae51d3" podNamespace="kube-system" podName="kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.288314 kubelet[1730]: I0702 11:33:08.288273 1730 topology_manager.go:215] "Topology Admit Handler" podUID="a2e82ff1797f5618f1b5584e60ea977f" podNamespace="kube-system" podName="kube-scheduler-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.295337 systemd[1]: Created slice kubepods-burstable-pod13510be88e2cf1e682f7d0ece3e1fb69.slice. Jul 2 11:33:08.303387 kubelet[1730]: E0702 11:33:08.303337 1730 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.62.206:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-z4l15.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.62.206:6443: connect: connection refused" interval="400ms" Jul 2 11:33:08.305391 systemd[1]: Created slice kubepods-burstable-pod1412d230174e921a028c3fc966ae51d3.slice. Jul 2 11:33:08.314557 systemd[1]: Created slice kubepods-burstable-poda2e82ff1797f5618f1b5584e60ea977f.slice. Jul 2 11:33:08.401102 kubelet[1730]: I0702 11:33:08.401032 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/13510be88e2cf1e682f7d0ece3e1fb69-ca-certs\") pod \"kube-apiserver-srv-z4l15.gb1.brightbox.com\" (UID: \"13510be88e2cf1e682f7d0ece3e1fb69\") " pod="kube-system/kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.401102 kubelet[1730]: I0702 11:33:08.401100 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/13510be88e2cf1e682f7d0ece3e1fb69-k8s-certs\") pod \"kube-apiserver-srv-z4l15.gb1.brightbox.com\" (UID: \"13510be88e2cf1e682f7d0ece3e1fb69\") " pod="kube-system/kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.401723 kubelet[1730]: I0702 11:33:08.401147 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/13510be88e2cf1e682f7d0ece3e1fb69-usr-share-ca-certificates\") pod \"kube-apiserver-srv-z4l15.gb1.brightbox.com\" (UID: \"13510be88e2cf1e682f7d0ece3e1fb69\") " pod="kube-system/kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.401723 kubelet[1730]: I0702 11:33:08.401181 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-flexvolume-dir\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.401723 kubelet[1730]: I0702 11:33:08.401213 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-ca-certs\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.401723 kubelet[1730]: I0702 11:33:08.401249 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-k8s-certs\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.401723 kubelet[1730]: I0702 11:33:08.401284 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-kubeconfig\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.402007 kubelet[1730]: I0702 11:33:08.401328 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.402007 kubelet[1730]: I0702 11:33:08.401361 1730 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a2e82ff1797f5618f1b5584e60ea977f-kubeconfig\") pod \"kube-scheduler-srv-z4l15.gb1.brightbox.com\" (UID: \"a2e82ff1797f5618f1b5584e60ea977f\") " pod="kube-system/kube-scheduler-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.406892 kubelet[1730]: I0702 11:33:08.406865 1730 kubelet_node_status.go:73] "Attempting to register node" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.407359 kubelet[1730]: E0702 11:33:08.407334 1730 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.62.206:6443/api/v1/nodes\": dial tcp 10.230.62.206:6443: connect: connection refused" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.605202 env[1193]: time="2024-07-02T11:33:08.604407331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-z4l15.gb1.brightbox.com,Uid:13510be88e2cf1e682f7d0ece3e1fb69,Namespace:kube-system,Attempt:0,}" Jul 2 11:33:08.612451 env[1193]: time="2024-07-02T11:33:08.612414079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-z4l15.gb1.brightbox.com,Uid:1412d230174e921a028c3fc966ae51d3,Namespace:kube-system,Attempt:0,}" Jul 2 11:33:08.619247 env[1193]: time="2024-07-02T11:33:08.619170517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-z4l15.gb1.brightbox.com,Uid:a2e82ff1797f5618f1b5584e60ea977f,Namespace:kube-system,Attempt:0,}" Jul 2 11:33:08.704557 kubelet[1730]: E0702 11:33:08.704507 1730 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.62.206:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-z4l15.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.62.206:6443: connect: connection refused" interval="800ms" Jul 2 11:33:08.811141 kubelet[1730]: I0702 11:33:08.810936 1730 kubelet_node_status.go:73] "Attempting to register node" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:08.811369 kubelet[1730]: E0702 11:33:08.811337 1730 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.62.206:6443/api/v1/nodes\": dial tcp 10.230.62.206:6443: connect: connection refused" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:09.233454 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3963461505.mount: Deactivated successfully. Jul 2 11:33:09.242364 env[1193]: time="2024-07-02T11:33:09.242258272Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.243423 kubelet[1730]: W0702 11:33:09.243296 1730 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.230.62.206:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:09.243423 kubelet[1730]: E0702 11:33:09.243383 1730 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.230.62.206:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:09.246726 env[1193]: time="2024-07-02T11:33:09.246677971Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.249369 env[1193]: time="2024-07-02T11:33:09.249325065Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.250349 env[1193]: time="2024-07-02T11:33:09.250312637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.251936 env[1193]: time="2024-07-02T11:33:09.251899172Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.254271 env[1193]: time="2024-07-02T11:33:09.254236009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.258468 env[1193]: time="2024-07-02T11:33:09.258434488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.262595 env[1193]: time="2024-07-02T11:33:09.262560968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.263685 env[1193]: time="2024-07-02T11:33:09.263634738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.264749 env[1193]: time="2024-07-02T11:33:09.264714566Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.265785 env[1193]: time="2024-07-02T11:33:09.265750994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.266876 env[1193]: time="2024-07-02T11:33:09.266828046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:09.275657 kubelet[1730]: W0702 11:33:09.275527 1730 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.230.62.206:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-z4l15.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:09.275657 kubelet[1730]: E0702 11:33:09.275603 1730 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.230.62.206:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-z4l15.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:09.306240 env[1193]: time="2024-07-02T11:33:09.306129205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:33:09.306502 env[1193]: time="2024-07-02T11:33:09.306207696Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:33:09.306502 env[1193]: time="2024-07-02T11:33:09.306229944Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:33:09.306715 env[1193]: time="2024-07-02T11:33:09.306476356Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c110bc14e83d206ee4c607e139a0938ce39657e43c0194e1121d0a647bf961f1 pid=1770 runtime=io.containerd.runc.v2 Jul 2 11:33:09.308280 env[1193]: time="2024-07-02T11:33:09.308149835Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:33:09.308474 env[1193]: time="2024-07-02T11:33:09.308420301Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:33:09.308658 env[1193]: time="2024-07-02T11:33:09.308603007Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:33:09.309048 env[1193]: time="2024-07-02T11:33:09.308997408Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c21515ab6cd96c3a518717a64bc17f637240a58a644d5a94334c4cc04ba436a3 pid=1787 runtime=io.containerd.runc.v2 Jul 2 11:33:09.334939 env[1193]: time="2024-07-02T11:33:09.334809976Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:33:09.334939 env[1193]: time="2024-07-02T11:33:09.334883744Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:33:09.335204 env[1193]: time="2024-07-02T11:33:09.334902081Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:33:09.335204 env[1193]: time="2024-07-02T11:33:09.335126041Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/402f4954af36f288af050e5ff311aacc86831b17fa6bb886070e9471701bbad2 pid=1808 runtime=io.containerd.runc.v2 Jul 2 11:33:09.340409 systemd[1]: Started cri-containerd-c21515ab6cd96c3a518717a64bc17f637240a58a644d5a94334c4cc04ba436a3.scope. Jul 2 11:33:09.357552 systemd[1]: Started cri-containerd-c110bc14e83d206ee4c607e139a0938ce39657e43c0194e1121d0a647bf961f1.scope. Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.377000 audit: BPF prog-id=61 op=LOAD Jul 2 11:33:09.384000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.384000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1787 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531356162366364393663336135313837313761363462633137 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1787 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531356162366364393663336135313837313761363462633137 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.385000 audit: BPF prog-id=62 op=LOAD Jul 2 11:33:09.385000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00030b160 items=0 ppid=1787 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531356162366364393663336135313837313761363462633137 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.387000 audit: BPF prog-id=63 op=LOAD Jul 2 11:33:09.387000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00030b1a8 items=0 ppid=1787 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531356162366364393663336135313837313761363462633137 Jul 2 11:33:09.388000 audit: BPF prog-id=63 op=UNLOAD Jul 2 11:33:09.388000 audit: BPF prog-id=62 op=UNLOAD Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.388000 audit: BPF prog-id=64 op=LOAD Jul 2 11:33:09.388000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00030b5b8 items=0 ppid=1787 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531356162366364393663336135313837313761363462633137 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.396000 audit: BPF prog-id=65 op=LOAD Jul 2 11:33:09.397000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.397000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1770 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313062633134653833643230366565346336303765313339613039 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1770 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313062633134653833643230366565346336303765313339613039 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.398000 audit: BPF prog-id=66 op=LOAD Jul 2 11:33:09.398000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d4670 items=0 ppid=1770 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313062633134653833643230366565346336303765313339613039 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.399000 audit: BPF prog-id=67 op=LOAD Jul 2 11:33:09.399000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d46b8 items=0 ppid=1770 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313062633134653833643230366565346336303765313339613039 Jul 2 11:33:09.401000 audit: BPF prog-id=67 op=UNLOAD Jul 2 11:33:09.401000 audit: BPF prog-id=66 op=UNLOAD Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.401000 audit: BPF prog-id=68 op=LOAD Jul 2 11:33:09.401000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d4ac8 items=0 ppid=1770 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313062633134653833643230366565346336303765313339613039 Jul 2 11:33:09.415963 systemd[1]: Started cri-containerd-402f4954af36f288af050e5ff311aacc86831b17fa6bb886070e9471701bbad2.scope. Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.470000 audit: BPF prog-id=69 op=LOAD Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1808 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326634393534616633366632383861663035306535666633313161 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=1808 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326634393534616633366632383861663035306535666633313161 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit: BPF prog-id=70 op=LOAD Jul 2 11:33:09.472000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000170fd0 items=0 ppid=1808 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326634393534616633366632383861663035306535666633313161 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit: BPF prog-id=71 op=LOAD Jul 2 11:33:09.472000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000171018 items=0 ppid=1808 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326634393534616633366632383861663035306535666633313161 Jul 2 11:33:09.472000 audit: BPF prog-id=71 op=UNLOAD Jul 2 11:33:09.472000 audit: BPF prog-id=70 op=UNLOAD Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.472000 audit: BPF prog-id=72 op=LOAD Jul 2 11:33:09.472000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000171428 items=0 ppid=1808 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326634393534616633366632383861663035306535666633313161 Jul 2 11:33:09.489567 env[1193]: time="2024-07-02T11:33:09.485288694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-z4l15.gb1.brightbox.com,Uid:13510be88e2cf1e682f7d0ece3e1fb69,Namespace:kube-system,Attempt:0,} returns sandbox id \"c21515ab6cd96c3a518717a64bc17f637240a58a644d5a94334c4cc04ba436a3\"" Jul 2 11:33:09.495705 env[1193]: time="2024-07-02T11:33:09.495633007Z" level=info msg="CreateContainer within sandbox \"c21515ab6cd96c3a518717a64bc17f637240a58a644d5a94334c4cc04ba436a3\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 11:33:09.505073 env[1193]: time="2024-07-02T11:33:09.504988850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-z4l15.gb1.brightbox.com,Uid:a2e82ff1797f5618f1b5584e60ea977f,Namespace:kube-system,Attempt:0,} returns sandbox id \"c110bc14e83d206ee4c607e139a0938ce39657e43c0194e1121d0a647bf961f1\"" Jul 2 11:33:09.505734 kubelet[1730]: E0702 11:33:09.505661 1730 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.62.206:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-z4l15.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.62.206:6443: connect: connection refused" interval="1.6s" Jul 2 11:33:09.511942 env[1193]: time="2024-07-02T11:33:09.511899254Z" level=info msg="CreateContainer within sandbox \"c110bc14e83d206ee4c607e139a0938ce39657e43c0194e1121d0a647bf961f1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 11:33:09.526608 env[1193]: time="2024-07-02T11:33:09.526539008Z" level=info msg="CreateContainer within sandbox \"c21515ab6cd96c3a518717a64bc17f637240a58a644d5a94334c4cc04ba436a3\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b71cd7ba5f3c31f82cb3073e438b6e6335c51e1fe7c8452c706ebe36bdad283c\"" Jul 2 11:33:09.528404 env[1193]: time="2024-07-02T11:33:09.528366579Z" level=info msg="StartContainer for \"b71cd7ba5f3c31f82cb3073e438b6e6335c51e1fe7c8452c706ebe36bdad283c\"" Jul 2 11:33:09.535477 env[1193]: time="2024-07-02T11:33:09.535422624Z" level=info msg="CreateContainer within sandbox \"c110bc14e83d206ee4c607e139a0938ce39657e43c0194e1121d0a647bf961f1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f8dcdbf18789415d5e07b585ac3041be09e21c1bd58d54bdd4070fc8751bc91c\"" Jul 2 11:33:09.536181 env[1193]: time="2024-07-02T11:33:09.536141564Z" level=info msg="StartContainer for \"f8dcdbf18789415d5e07b585ac3041be09e21c1bd58d54bdd4070fc8751bc91c\"" Jul 2 11:33:09.538007 env[1193]: time="2024-07-02T11:33:09.537961254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-z4l15.gb1.brightbox.com,Uid:1412d230174e921a028c3fc966ae51d3,Namespace:kube-system,Attempt:0,} returns sandbox id \"402f4954af36f288af050e5ff311aacc86831b17fa6bb886070e9471701bbad2\"" Jul 2 11:33:09.542949 env[1193]: time="2024-07-02T11:33:09.542904819Z" level=info msg="CreateContainer within sandbox \"402f4954af36f288af050e5ff311aacc86831b17fa6bb886070e9471701bbad2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 11:33:09.554392 env[1193]: time="2024-07-02T11:33:09.554342776Z" level=info msg="CreateContainer within sandbox \"402f4954af36f288af050e5ff311aacc86831b17fa6bb886070e9471701bbad2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"134932d38dae1be5b29a1428ba293897487a860ae2b385a4824cfb513abdced4\"" Jul 2 11:33:09.555647 env[1193]: time="2024-07-02T11:33:09.555597113Z" level=info msg="StartContainer for \"134932d38dae1be5b29a1428ba293897487a860ae2b385a4824cfb513abdced4\"" Jul 2 11:33:09.571321 systemd[1]: Started cri-containerd-b71cd7ba5f3c31f82cb3073e438b6e6335c51e1fe7c8452c706ebe36bdad283c.scope. Jul 2 11:33:09.591026 systemd[1]: Started cri-containerd-134932d38dae1be5b29a1428ba293897487a860ae2b385a4824cfb513abdced4.scope. Jul 2 11:33:09.604367 systemd[1]: Started cri-containerd-f8dcdbf18789415d5e07b585ac3041be09e21c1bd58d54bdd4070fc8751bc91c.scope. Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.612000 audit: BPF prog-id=73 op=LOAD Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1787 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316364376261356633633331663832636233303733653433386236 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1787 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316364376261356633633331663832636233303733653433386236 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.616738 kubelet[1730]: I0702 11:33:09.616369 1730 kubelet_node_status.go:73] "Attempting to register node" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:09.617018 kubelet[1730]: E0702 11:33:09.616986 1730 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.62.206:6443/api/v1/nodes\": dial tcp 10.230.62.206:6443: connect: connection refused" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.614000 audit: BPF prog-id=74 op=LOAD Jul 2 11:33:09.614000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003015f0 items=0 ppid=1787 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316364376261356633633331663832636233303733653433386236 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit: BPF prog-id=75 op=LOAD Jul 2 11:33:09.621000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000301638 items=0 ppid=1787 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316364376261356633633331663832636233303733653433386236 Jul 2 11:33:09.621000 audit: BPF prog-id=75 op=UNLOAD Jul 2 11:33:09.621000 audit: BPF prog-id=74 op=UNLOAD Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.621000 audit: BPF prog-id=76 op=LOAD Jul 2 11:33:09.621000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000301a48 items=0 ppid=1787 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316364376261356633633331663832636233303733653433386236 Jul 2 11:33:09.630524 kubelet[1730]: W0702 11:33:09.630427 1730 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.230.62.206:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:09.630642 kubelet[1730]: E0702 11:33:09.630542 1730 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.230.62.206:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.649000 audit: BPF prog-id=77 op=LOAD Jul 2 11:33:09.651941 kubelet[1730]: W0702 11:33:09.651485 1730 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.230.62.206:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:09.651941 kubelet[1730]: E0702 11:33:09.651567 1730 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.230.62.206:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:09.651000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.651000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1808 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343933326433386461653162653562323961313432386261323933 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1808 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343933326433386461653162653562323961313432386261323933 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.652000 audit: BPF prog-id=78 op=LOAD Jul 2 11:33:09.652000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d1d00 items=0 ppid=1808 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343933326433386461653162653562323961313432386261323933 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.653000 audit: BPF prog-id=79 op=LOAD Jul 2 11:33:09.653000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d1d48 items=0 ppid=1808 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343933326433386461653162653562323961313432386261323933 Jul 2 11:33:09.654000 audit: BPF prog-id=79 op=UNLOAD Jul 2 11:33:09.655000 audit: BPF prog-id=78 op=UNLOAD Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.655000 audit: BPF prog-id=80 op=LOAD Jul 2 11:33:09.655000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00033e158 items=0 ppid=1808 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343933326433386461653162653562323961313432386261323933 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.673000 audit: BPF prog-id=81 op=LOAD Jul 2 11:33:09.676000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.676000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1770 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638646364626631383738393431356435653037623538356163333034 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1770 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638646364626631383738393431356435653037623538356163333034 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.677000 audit: BPF prog-id=82 op=LOAD Jul 2 11:33:09.677000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003f2c80 items=0 ppid=1770 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638646364626631383738393431356435653037623538356163333034 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.679000 audit: BPF prog-id=83 op=LOAD Jul 2 11:33:09.679000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003f2cc8 items=0 ppid=1770 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638646364626631383738393431356435653037623538356163333034 Jul 2 11:33:09.680000 audit: BPF prog-id=83 op=UNLOAD Jul 2 11:33:09.680000 audit: BPF prog-id=82 op=UNLOAD Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:09.680000 audit: BPF prog-id=84 op=LOAD Jul 2 11:33:09.680000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f30d8 items=0 ppid=1770 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:09.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638646364626631383738393431356435653037623538356163333034 Jul 2 11:33:09.699371 env[1193]: time="2024-07-02T11:33:09.699311105Z" level=info msg="StartContainer for \"b71cd7ba5f3c31f82cb3073e438b6e6335c51e1fe7c8452c706ebe36bdad283c\" returns successfully" Jul 2 11:33:09.716351 env[1193]: time="2024-07-02T11:33:09.716298079Z" level=info msg="StartContainer for \"134932d38dae1be5b29a1428ba293897487a860ae2b385a4824cfb513abdced4\" returns successfully" Jul 2 11:33:09.752793 env[1193]: time="2024-07-02T11:33:09.748645875Z" level=info msg="StartContainer for \"f8dcdbf18789415d5e07b585ac3041be09e21c1bd58d54bdd4070fc8751bc91c\" returns successfully" Jul 2 11:33:10.219652 kubelet[1730]: E0702 11:33:10.219603 1730 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.230.62.206:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.230.62.206:6443: connect: connection refused Jul 2 11:33:11.220999 kubelet[1730]: I0702 11:33:11.220077 1730 kubelet_node_status.go:73] "Attempting to register node" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:11.277000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:11.277000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000802180 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:11.277000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:11.278000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:11.278000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00044a160 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:11.278000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:12.709000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.712981 kernel: kauditd_printk_skb: 387 callbacks suppressed Jul 2 11:33:12.713168 kernel: audit: type=1400 audit(1719919992.709:568): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.712000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.727717 kernel: audit: type=1400 audit(1719919992.712:569): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.712000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0032da900 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.737896 kernel: audit: type=1300 audit(1719919992.712:569): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0032da900 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.751688 kernel: audit: type=1327 audit(1719919992.712:569): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.751820 kernel: audit: type=1300 audit(1719919992.709:568): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c007e93380 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.709000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c007e93380 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.765699 kernel: audit: type=1327 audit(1719919992.709:568): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.719000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.775711 kernel: audit: type=1400 audit(1719919992.719:570): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.719000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0034b5fc0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.785701 kernel: audit: type=1300 audit(1719919992.719:570): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0034b5fc0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.800694 kernel: audit: type=1327 audit(1719919992.719:570): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.767000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.808722 kernel: audit: type=1400 audit(1719919992.767:571): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.767000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c007e93830 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.787000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.787000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c003f640c0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.787000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:12.787000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c007e93a40 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:33:12.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:33:12.968310 kubelet[1730]: I0702 11:33:12.967093 1730 kubelet_node_status.go:76] "Successfully registered node" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:13.054196 kubelet[1730]: I0702 11:33:13.054126 1730 apiserver.go:52] "Watching apiserver" Jul 2 11:33:13.100237 kubelet[1730]: I0702 11:33:13.100161 1730 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 11:33:15.003028 kubelet[1730]: W0702 11:33:15.002919 1730 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:33:15.986587 systemd[1]: Reloading. Jul 2 11:33:16.127129 /usr/lib/systemd/system-generators/torcx-generator[2018]: time="2024-07-02T11:33:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 11:33:16.127187 /usr/lib/systemd/system-generators/torcx-generator[2018]: time="2024-07-02T11:33:16Z" level=info msg="torcx already run" Jul 2 11:33:16.251039 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 11:33:16.251838 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 11:33:16.290083 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 11:33:16.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.424000 audit: BPF prog-id=85 op=LOAD Jul 2 11:33:16.425000 audit: BPF prog-id=46 op=UNLOAD Jul 2 11:33:16.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit: BPF prog-id=86 op=LOAD Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.427000 audit: BPF prog-id=87 op=LOAD Jul 2 11:33:16.427000 audit: BPF prog-id=47 op=UNLOAD Jul 2 11:33:16.427000 audit: BPF prog-id=48 op=UNLOAD Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.431000 audit: BPF prog-id=88 op=LOAD Jul 2 11:33:16.431000 audit: BPF prog-id=49 op=UNLOAD Jul 2 11:33:16.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit: BPF prog-id=89 op=LOAD Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.434000 audit: BPF prog-id=90 op=LOAD Jul 2 11:33:16.434000 audit: BPF prog-id=50 op=UNLOAD Jul 2 11:33:16.434000 audit: BPF prog-id=51 op=UNLOAD Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit: BPF prog-id=91 op=LOAD Jul 2 11:33:16.436000 audit: BPF prog-id=52 op=UNLOAD Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit: BPF prog-id=92 op=LOAD Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.438000 audit: BPF prog-id=93 op=LOAD Jul 2 11:33:16.438000 audit: BPF prog-id=53 op=UNLOAD Jul 2 11:33:16.438000 audit: BPF prog-id=54 op=UNLOAD Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.440000 audit: BPF prog-id=94 op=LOAD Jul 2 11:33:16.440000 audit: BPF prog-id=55 op=UNLOAD Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.441000 audit: BPF prog-id=95 op=LOAD Jul 2 11:33:16.441000 audit: BPF prog-id=73 op=UNLOAD Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.444000 audit: BPF prog-id=96 op=LOAD Jul 2 11:33:16.444000 audit: BPF prog-id=56 op=UNLOAD Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.445000 audit: BPF prog-id=97 op=LOAD Jul 2 11:33:16.445000 audit: BPF prog-id=61 op=UNLOAD Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit: BPF prog-id=98 op=LOAD Jul 2 11:33:16.449000 audit: BPF prog-id=57 op=UNLOAD Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.449000 audit: BPF prog-id=99 op=LOAD Jul 2 11:33:16.449000 audit: BPF prog-id=81 op=UNLOAD Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.451000 audit: BPF prog-id=100 op=LOAD Jul 2 11:33:16.451000 audit: BPF prog-id=69 op=UNLOAD Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.452000 audit: BPF prog-id=101 op=LOAD Jul 2 11:33:16.452000 audit: BPF prog-id=65 op=UNLOAD Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit: BPF prog-id=102 op=LOAD Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.453000 audit: BPF prog-id=103 op=LOAD Jul 2 11:33:16.453000 audit: BPF prog-id=58 op=UNLOAD Jul 2 11:33:16.453000 audit: BPF prog-id=59 op=UNLOAD Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.458000 audit: BPF prog-id=104 op=LOAD Jul 2 11:33:16.459000 audit: BPF prog-id=60 op=UNLOAD Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:16.461000 audit: BPF prog-id=105 op=LOAD Jul 2 11:33:16.461000 audit: BPF prog-id=77 op=UNLOAD Jul 2 11:33:16.485978 kubelet[1730]: I0702 11:33:16.485920 1730 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 11:33:16.486999 systemd[1]: Stopping kubelet.service... Jul 2 11:33:16.515312 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 11:33:16.516032 systemd[1]: Stopped kubelet.service. Jul 2 11:33:16.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:16.516585 systemd[1]: kubelet.service: Consumed 1.174s CPU time. Jul 2 11:33:16.522280 systemd[1]: Starting kubelet.service... Jul 2 11:33:17.664710 systemd[1]: Started kubelet.service. Jul 2 11:33:17.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:17.822879 kubelet[2066]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 11:33:17.823541 kubelet[2066]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 11:33:17.823652 kubelet[2066]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 11:33:17.823971 kubelet[2066]: I0702 11:33:17.823914 2066 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 11:33:17.861288 kubelet[2066]: I0702 11:33:17.861242 2066 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 11:33:17.861501 kubelet[2066]: I0702 11:33:17.861476 2066 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 11:33:17.862414 kubelet[2066]: I0702 11:33:17.862388 2066 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 11:33:17.865220 kubelet[2066]: I0702 11:33:17.865194 2066 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 11:33:17.881409 kubelet[2066]: I0702 11:33:17.881360 2066 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 11:33:17.894834 kubelet[2066]: I0702 11:33:17.894799 2066 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 11:33:17.895663 kubelet[2066]: I0702 11:33:17.895638 2066 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 11:33:17.896099 kubelet[2066]: I0702 11:33:17.896068 2066 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 11:33:17.896635 kubelet[2066]: I0702 11:33:17.896608 2066 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 11:33:17.896837 kubelet[2066]: I0702 11:33:17.896810 2066 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 11:33:17.897041 kubelet[2066]: I0702 11:33:17.897016 2066 state_mem.go:36] "Initialized new in-memory state store" Jul 2 11:33:17.899981 kubelet[2066]: I0702 11:33:17.899947 2066 kubelet.go:396] "Attempting to sync node with API server" Jul 2 11:33:17.901581 kubelet[2066]: I0702 11:33:17.901555 2066 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 11:33:17.901978 kubelet[2066]: I0702 11:33:17.901931 2066 kubelet.go:312] "Adding apiserver pod source" Jul 2 11:33:17.905768 kubelet[2066]: I0702 11:33:17.905734 2066 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 11:33:17.921055 kubelet[2066]: I0702 11:33:17.919751 2066 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 11:33:17.921913 kubelet[2066]: I0702 11:33:17.921845 2066 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 11:33:17.923607 kubelet[2066]: I0702 11:33:17.923582 2066 server.go:1256] "Started kubelet" Jul 2 11:33:17.924000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526946 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 11:33:17.927014 kernel: kauditd_printk_skb: 254 callbacks suppressed Jul 2 11:33:17.927771 kernel: audit: type=1400 audit(1719919997.924:820): avc: denied { watch } for pid=1944 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526946 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 11:33:17.929768 kubelet[2066]: I0702 11:33:17.929731 2066 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 11:33:17.929970 kubelet[2066]: I0702 11:33:17.929942 2066 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 11:33:17.930157 kubelet[2066]: I0702 11:33:17.930129 2066 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 11:33:17.938464 kubelet[2066]: I0702 11:33:17.938429 2066 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 11:33:17.924000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b09500 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:17.941637 kubelet[2066]: I0702 11:33:17.941610 2066 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 11:33:17.942062 kubelet[2066]: I0702 11:33:17.942037 2066 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 11:33:17.944689 kubelet[2066]: I0702 11:33:17.944645 2066 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 11:33:17.946197 kubelet[2066]: I0702 11:33:17.946165 2066 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 11:33:17.946358 kubelet[2066]: I0702 11:33:17.946332 2066 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 11:33:17.946518 kubelet[2066]: I0702 11:33:17.946492 2066 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 11:33:17.946753 kubelet[2066]: E0702 11:33:17.946728 2066 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 11:33:17.950742 kernel: audit: type=1300 audit(1719919997.924:820): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b09500 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:17.953962 kubelet[2066]: I0702 11:33:17.953928 2066 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 11:33:17.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:17.962947 kubelet[2066]: I0702 11:33:17.962919 2066 factory.go:221] Registration of the systemd container factory successfully Jul 2 11:33:17.963208 kubelet[2066]: I0702 11:33:17.963169 2066 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 11:33:17.965665 kernel: audit: type=1327 audit(1719919997.924:820): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:17.970384 kernel: audit: type=1400 audit(1719919997.928:821): avc: denied { mac_admin } for pid=2066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:17.928000 audit[2066]: AVC avc: denied { mac_admin } for pid=2066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:17.980270 kubelet[2066]: I0702 11:33:17.980231 2066 server.go:461] "Adding debug handlers to kubelet server" Jul 2 11:33:17.928000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:17.983458 kubelet[2066]: I0702 11:33:17.983429 2066 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 11:33:17.984198 kubelet[2066]: I0702 11:33:17.984172 2066 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 11:33:17.986567 kernel: audit: type=1401 audit(1719919997.928:821): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:17.986696 kernel: audit: type=1300 audit(1719919997.928:821): arch=c000003e syscall=188 success=no exit=-22 a0=c000c51b90 a1=c000c9c690 a2=c000c51b60 a3=25 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:17.928000 audit[2066]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c51b90 a1=c000c9c690 a2=c000c51b60 a3=25 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:17.990125 kubelet[2066]: I0702 11:33:17.990098 2066 factory.go:221] Registration of the containerd container factory successfully Jul 2 11:33:17.928000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:18.002691 kernel: audit: type=1327 audit(1719919997.928:821): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:17.929000 audit[2066]: AVC avc: denied { mac_admin } for pid=2066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:18.008692 kernel: audit: type=1400 audit(1719919997.929:822): avc: denied { mac_admin } for pid=2066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:17.929000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:18.012703 kernel: audit: type=1401 audit(1719919997.929:822): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:17.929000 audit[2066]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c53fe0 a1=c000c9c6a8 a2=c000c51c20 a3=25 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:18.021800 kernel: audit: type=1300 audit(1719919997.929:822): arch=c000003e syscall=188 success=no exit=-22 a0=c000c53fe0 a1=c000c9c6a8 a2=c000c51c20 a3=25 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:17.929000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:18.047426 kubelet[2066]: E0702 11:33:18.047003 2066 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 11:33:18.064968 kubelet[2066]: I0702 11:33:18.064079 2066 kubelet_node_status.go:73] "Attempting to register node" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.083583 kubelet[2066]: I0702 11:33:18.083242 2066 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 11:33:18.083583 kubelet[2066]: I0702 11:33:18.083276 2066 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 11:33:18.083583 kubelet[2066]: I0702 11:33:18.083313 2066 state_mem.go:36] "Initialized new in-memory state store" Jul 2 11:33:18.085944 kubelet[2066]: I0702 11:33:18.085917 2066 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 11:33:18.086787 kubelet[2066]: I0702 11:33:18.086090 2066 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 11:33:18.086933 kubelet[2066]: I0702 11:33:18.086906 2066 policy_none.go:49] "None policy: Start" Jul 2 11:33:18.087622 kubelet[2066]: I0702 11:33:18.087595 2066 kubelet_node_status.go:112] "Node was previously registered" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.088058 kubelet[2066]: I0702 11:33:18.088033 2066 kubelet_node_status.go:76] "Successfully registered node" node="srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.092400 kubelet[2066]: I0702 11:33:18.092363 2066 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 11:33:18.092559 kubelet[2066]: I0702 11:33:18.092535 2066 state_mem.go:35] "Initializing new in-memory state store" Jul 2 11:33:18.092975 kubelet[2066]: I0702 11:33:18.092950 2066 state_mem.go:75] "Updated machine memory state" Jul 2 11:33:18.111251 kubelet[2066]: I0702 11:33:18.111204 2066 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 11:33:18.110000 audit[2066]: AVC avc: denied { mac_admin } for pid=2066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:18.110000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:33:18.110000 audit[2066]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010e2780 a1=c0010a14e8 a2=c0010e2750 a3=25 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:18.110000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:33:18.112941 kubelet[2066]: I0702 11:33:18.112916 2066 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 11:33:18.118211 kubelet[2066]: I0702 11:33:18.115748 2066 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 11:33:18.247720 kubelet[2066]: I0702 11:33:18.247659 2066 topology_manager.go:215] "Topology Admit Handler" podUID="13510be88e2cf1e682f7d0ece3e1fb69" podNamespace="kube-system" podName="kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.247933 kubelet[2066]: I0702 11:33:18.247877 2066 topology_manager.go:215] "Topology Admit Handler" podUID="1412d230174e921a028c3fc966ae51d3" podNamespace="kube-system" podName="kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.249700 kubelet[2066]: I0702 11:33:18.248881 2066 topology_manager.go:215] "Topology Admit Handler" podUID="a2e82ff1797f5618f1b5584e60ea977f" podNamespace="kube-system" podName="kube-scheduler-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.256386 kubelet[2066]: W0702 11:33:18.256348 2066 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:33:18.280943 kubelet[2066]: W0702 11:33:18.280897 2066 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:33:18.281700 kubelet[2066]: W0702 11:33:18.280919 2066 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:33:18.281845 kubelet[2066]: E0702 11:33:18.281767 2066 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" already exists" pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.344067 kubelet[2066]: I0702 11:33:18.343999 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/13510be88e2cf1e682f7d0ece3e1fb69-ca-certs\") pod \"kube-apiserver-srv-z4l15.gb1.brightbox.com\" (UID: \"13510be88e2cf1e682f7d0ece3e1fb69\") " pod="kube-system/kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.345476 kubelet[2066]: I0702 11:33:18.345238 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-flexvolume-dir\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.345712 kubelet[2066]: I0702 11:33:18.345665 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.345943 kubelet[2066]: I0702 11:33:18.345910 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/13510be88e2cf1e682f7d0ece3e1fb69-k8s-certs\") pod \"kube-apiserver-srv-z4l15.gb1.brightbox.com\" (UID: \"13510be88e2cf1e682f7d0ece3e1fb69\") " pod="kube-system/kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.346452 kubelet[2066]: I0702 11:33:18.346398 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/13510be88e2cf1e682f7d0ece3e1fb69-usr-share-ca-certificates\") pod \"kube-apiserver-srv-z4l15.gb1.brightbox.com\" (UID: \"13510be88e2cf1e682f7d0ece3e1fb69\") " pod="kube-system/kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.346653 kubelet[2066]: I0702 11:33:18.346626 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-ca-certs\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.346787 kubelet[2066]: I0702 11:33:18.346699 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-k8s-certs\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.346787 kubelet[2066]: I0702 11:33:18.346739 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1412d230174e921a028c3fc966ae51d3-kubeconfig\") pod \"kube-controller-manager-srv-z4l15.gb1.brightbox.com\" (UID: \"1412d230174e921a028c3fc966ae51d3\") " pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.346914 kubelet[2066]: I0702 11:33:18.346787 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a2e82ff1797f5618f1b5584e60ea977f-kubeconfig\") pod \"kube-scheduler-srv-z4l15.gb1.brightbox.com\" (UID: \"a2e82ff1797f5618f1b5584e60ea977f\") " pod="kube-system/kube-scheduler-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:18.907912 kubelet[2066]: I0702 11:33:18.907823 2066 apiserver.go:52] "Watching apiserver" Jul 2 11:33:18.942691 kubelet[2066]: I0702 11:33:18.942621 2066 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 11:33:19.069111 kubelet[2066]: W0702 11:33:19.069063 2066 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:33:19.069330 kubelet[2066]: E0702 11:33:19.069195 2066 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-srv-z4l15.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-z4l15.gb1.brightbox.com" Jul 2 11:33:19.187228 kubelet[2066]: I0702 11:33:19.186661 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-z4l15.gb1.brightbox.com" podStartSLOduration=1.186579138 podStartE2EDuration="1.186579138s" podCreationTimestamp="2024-07-02 11:33:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:33:19.178316346 +0000 UTC m=+1.492706598" watchObservedRunningTime="2024-07-02 11:33:19.186579138 +0000 UTC m=+1.500969394" Jul 2 11:33:19.248462 kubelet[2066]: I0702 11:33:19.248413 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-z4l15.gb1.brightbox.com" podStartSLOduration=5.248362202 podStartE2EDuration="5.248362202s" podCreationTimestamp="2024-07-02 11:33:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:33:19.202133284 +0000 UTC m=+1.516523536" watchObservedRunningTime="2024-07-02 11:33:19.248362202 +0000 UTC m=+1.562752465" Jul 2 11:33:19.284997 kubelet[2066]: I0702 11:33:19.284941 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-z4l15.gb1.brightbox.com" podStartSLOduration=1.284868111 podStartE2EDuration="1.284868111s" podCreationTimestamp="2024-07-02 11:33:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:33:19.249520495 +0000 UTC m=+1.563910748" watchObservedRunningTime="2024-07-02 11:33:19.284868111 +0000 UTC m=+1.599258358" Jul 2 11:33:24.073819 sudo[1361]: pam_unix(sudo:session): session closed for user root Jul 2 11:33:24.087044 kernel: kauditd_printk_skb: 5 callbacks suppressed Jul 2 11:33:24.087252 kernel: audit: type=1106 audit(1719920004.073:824): pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:33:24.073000 audit[1361]: USER_END pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:33:24.073000 audit[1361]: CRED_DISP pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:33:24.102598 kernel: audit: type=1104 audit(1719920004.073:825): pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:33:24.217489 sshd[1358]: pam_unix(sshd:session): session closed for user core Jul 2 11:33:24.220000 audit[1358]: USER_END pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:33:24.223090 systemd[1]: sshd@6-10.230.62.206:22-147.75.109.163:42408.service: Deactivated successfully. Jul 2 11:33:24.224837 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 11:33:24.225076 systemd[1]: session-7.scope: Consumed 6.382s CPU time. Jul 2 11:33:24.228700 kernel: audit: type=1106 audit(1719920004.220:826): pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:33:24.229616 systemd-logind[1186]: Session 7 logged out. Waiting for processes to exit. Jul 2 11:33:24.231948 systemd-logind[1186]: Removed session 7. Jul 2 11:33:24.220000 audit[1358]: CRED_DISP pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:33:24.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.62.206:22-147.75.109.163:42408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:24.245202 kernel: audit: type=1104 audit(1719920004.220:827): pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:33:24.245397 kernel: audit: type=1131 audit(1719920004.220:828): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.62.206:22-147.75.109.163:42408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:33:28.689000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:28.689000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012fba40 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:28.705417 kernel: audit: type=1400 audit(1719920008.689:829): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:28.705545 kernel: audit: type=1300 audit(1719920008.689:829): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012fba40 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:28.705629 kernel: audit: type=1327 audit(1719920008.689:829): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:28.689000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:28.704000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:28.704000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134eac0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:28.727850 kernel: audit: type=1400 audit(1719920008.704:830): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:28.727944 kernel: audit: type=1300 audit(1719920008.704:830): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134eac0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:28.704000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:28.704000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:28.704000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134ec80 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:28.704000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:28.711000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:33:28.711000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134ee40 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:33:28.711000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:33:28.834196 kubelet[2066]: I0702 11:33:28.834131 2066 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 11:33:28.836434 env[1193]: time="2024-07-02T11:33:28.836171060Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 11:33:28.837075 kubelet[2066]: I0702 11:33:28.836647 2066 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 11:33:29.805441 kubelet[2066]: I0702 11:33:29.805377 2066 topology_manager.go:215] "Topology Admit Handler" podUID="e5e93538-35b6-45ac-97a2-32010f4914bd" podNamespace="kube-system" podName="kube-proxy-9lfc2" Jul 2 11:33:29.818150 systemd[1]: Created slice kubepods-besteffort-pode5e93538_35b6_45ac_97a2_32010f4914bd.slice. Jul 2 11:33:29.819565 kubelet[2066]: I0702 11:33:29.819515 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e5e93538-35b6-45ac-97a2-32010f4914bd-kube-proxy\") pod \"kube-proxy-9lfc2\" (UID: \"e5e93538-35b6-45ac-97a2-32010f4914bd\") " pod="kube-system/kube-proxy-9lfc2" Jul 2 11:33:29.819694 kubelet[2066]: I0702 11:33:29.819584 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vb5xx\" (UniqueName: \"kubernetes.io/projected/e5e93538-35b6-45ac-97a2-32010f4914bd-kube-api-access-vb5xx\") pod \"kube-proxy-9lfc2\" (UID: \"e5e93538-35b6-45ac-97a2-32010f4914bd\") " pod="kube-system/kube-proxy-9lfc2" Jul 2 11:33:29.819694 kubelet[2066]: I0702 11:33:29.819623 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e5e93538-35b6-45ac-97a2-32010f4914bd-lib-modules\") pod \"kube-proxy-9lfc2\" (UID: \"e5e93538-35b6-45ac-97a2-32010f4914bd\") " pod="kube-system/kube-proxy-9lfc2" Jul 2 11:33:29.819857 kubelet[2066]: I0702 11:33:29.819708 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e5e93538-35b6-45ac-97a2-32010f4914bd-xtables-lock\") pod \"kube-proxy-9lfc2\" (UID: \"e5e93538-35b6-45ac-97a2-32010f4914bd\") " pod="kube-system/kube-proxy-9lfc2" Jul 2 11:33:29.966984 kubelet[2066]: I0702 11:33:29.966943 2066 topology_manager.go:215] "Topology Admit Handler" podUID="762b31f9-da1a-429c-b08e-f0fd981d1a25" podNamespace="tigera-operator" podName="tigera-operator-76c4974c85-rz4wh" Jul 2 11:33:29.974659 systemd[1]: Created slice kubepods-besteffort-pod762b31f9_da1a_429c_b08e_f0fd981d1a25.slice. Jul 2 11:33:29.979295 kubelet[2066]: W0702 11:33:29.979266 2066 reflector.go:539] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:srv-z4l15.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'srv-z4l15.gb1.brightbox.com' and this object Jul 2 11:33:29.979561 kubelet[2066]: E0702 11:33:29.979516 2066 reflector.go:147] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:srv-z4l15.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'srv-z4l15.gb1.brightbox.com' and this object Jul 2 11:33:30.021628 kubelet[2066]: I0702 11:33:30.021579 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-527fq\" (UniqueName: \"kubernetes.io/projected/762b31f9-da1a-429c-b08e-f0fd981d1a25-kube-api-access-527fq\") pod \"tigera-operator-76c4974c85-rz4wh\" (UID: \"762b31f9-da1a-429c-b08e-f0fd981d1a25\") " pod="tigera-operator/tigera-operator-76c4974c85-rz4wh" Jul 2 11:33:30.022011 kubelet[2066]: I0702 11:33:30.021968 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/762b31f9-da1a-429c-b08e-f0fd981d1a25-var-lib-calico\") pod \"tigera-operator-76c4974c85-rz4wh\" (UID: \"762b31f9-da1a-429c-b08e-f0fd981d1a25\") " pod="tigera-operator/tigera-operator-76c4974c85-rz4wh" Jul 2 11:33:30.130782 env[1193]: time="2024-07-02T11:33:30.130468619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9lfc2,Uid:e5e93538-35b6-45ac-97a2-32010f4914bd,Namespace:kube-system,Attempt:0,}" Jul 2 11:33:30.160659 env[1193]: time="2024-07-02T11:33:30.160259343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:33:30.160659 env[1193]: time="2024-07-02T11:33:30.160449548Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:33:30.160659 env[1193]: time="2024-07-02T11:33:30.160547348Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:33:30.161125 env[1193]: time="2024-07-02T11:33:30.161026455Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dddc9631a309b2e19ca8fbe70781cd867bb1959c84c843dd51776433ec8da00d pid=2154 runtime=io.containerd.runc.v2 Jul 2 11:33:30.194483 systemd[1]: Started cri-containerd-dddc9631a309b2e19ca8fbe70781cd867bb1959c84c843dd51776433ec8da00d.scope. Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.221629 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 11:33:30.221735 kernel: audit: type=1400 audit(1719920010.218:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.231445 kernel: audit: type=1400 audit(1719920010.218:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.237706 kernel: audit: type=1400 audit(1719920010.218:835): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.237797 kernel: audit: type=1400 audit(1719920010.218:836): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.247887 kernel: audit: type=1400 audit(1719920010.218:837): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.252975 kernel: audit: type=1400 audit(1719920010.218:838): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.253089 kernel: audit: type=1400 audit(1719920010.218:839): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.265471 kernel: audit: type=1400 audit(1719920010.218:840): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.265593 kernel: audit: type=1400 audit(1719920010.218:841): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.280714 kernel: audit: type=1400 audit(1719920010.225:842): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.281263 env[1193]: time="2024-07-02T11:33:30.281152296Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-rz4wh,Uid:762b31f9-da1a-429c-b08e-f0fd981d1a25,Namespace:tigera-operator,Attempt:0,}" Jul 2 11:33:30.225000 audit: BPF prog-id=106 op=LOAD Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2154 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464646339363331613330396232653139636138666265373037383163 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2154 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464646339363331613330396232653139636138666265373037383163 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit: BPF prog-id=107 op=LOAD Jul 2 11:33:30.230000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000212ed0 items=0 ppid=2154 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464646339363331613330396232653139636138666265373037383163 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit: BPF prog-id=108 op=LOAD Jul 2 11:33:30.230000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000212f18 items=0 ppid=2154 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464646339363331613330396232653139636138666265373037383163 Jul 2 11:33:30.230000 audit: BPF prog-id=108 op=UNLOAD Jul 2 11:33:30.230000 audit: BPF prog-id=107 op=UNLOAD Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.230000 audit: BPF prog-id=109 op=LOAD Jul 2 11:33:30.230000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000213328 items=0 ppid=2154 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464646339363331613330396232653139636138666265373037383163 Jul 2 11:33:30.299270 env[1193]: time="2024-07-02T11:33:30.299231732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9lfc2,Uid:e5e93538-35b6-45ac-97a2-32010f4914bd,Namespace:kube-system,Attempt:0,} returns sandbox id \"dddc9631a309b2e19ca8fbe70781cd867bb1959c84c843dd51776433ec8da00d\"" Jul 2 11:33:30.309127 env[1193]: time="2024-07-02T11:33:30.309087440Z" level=info msg="CreateContainer within sandbox \"dddc9631a309b2e19ca8fbe70781cd867bb1959c84c843dd51776433ec8da00d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 11:33:30.324406 env[1193]: time="2024-07-02T11:33:30.324064847Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:33:30.324406 env[1193]: time="2024-07-02T11:33:30.324137998Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:33:30.324406 env[1193]: time="2024-07-02T11:33:30.324156908Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:33:30.324710 env[1193]: time="2024-07-02T11:33:30.324403527Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24abafc9bb0337c8003b46a4b3d92df241f3117480b05688c96018b055a6fd59 pid=2195 runtime=io.containerd.runc.v2 Jul 2 11:33:30.329064 env[1193]: time="2024-07-02T11:33:30.329019626Z" level=info msg="CreateContainer within sandbox \"dddc9631a309b2e19ca8fbe70781cd867bb1959c84c843dd51776433ec8da00d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a4cca986f79dcbb3b6d7321493e9562fcc23d219e186711f4312828135532bac\"" Jul 2 11:33:30.330849 env[1193]: time="2024-07-02T11:33:30.329986627Z" level=info msg="StartContainer for \"a4cca986f79dcbb3b6d7321493e9562fcc23d219e186711f4312828135532bac\"" Jul 2 11:33:30.348062 systemd[1]: Started cri-containerd-24abafc9bb0337c8003b46a4b3d92df241f3117480b05688c96018b055a6fd59.scope. Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.376000 audit: BPF prog-id=110 op=LOAD Jul 2 11:33:30.379000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.379000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616261666339626230333337633830303362343661346233643932 Jul 2 11:33:30.382000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.382000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616261666339626230333337633830303362343661346233643932 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.383000 audit: BPF prog-id=111 op=LOAD Jul 2 11:33:30.383000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000380060 items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.386643 systemd[1]: Started cri-containerd-a4cca986f79dcbb3b6d7321493e9562fcc23d219e186711f4312828135532bac.scope. Jul 2 11:33:30.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616261666339626230333337633830303362343661346233643932 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.386000 audit: BPF prog-id=112 op=LOAD Jul 2 11:33:30.386000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003800a8 items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616261666339626230333337633830303362343661346233643932 Jul 2 11:33:30.388000 audit: BPF prog-id=112 op=UNLOAD Jul 2 11:33:30.388000 audit: BPF prog-id=111 op=UNLOAD Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.388000 audit: BPF prog-id=113 op=LOAD Jul 2 11:33:30.388000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003804b8 items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616261666339626230333337633830303362343661346233643932 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9ab15dbbb8 items=0 ppid=2154 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134636361393836663739646362623362366437333231343933653935 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit: BPF prog-id=114 op=LOAD Jul 2 11:33:30.440000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002efc58 items=0 ppid=2154 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134636361393836663739646362623362366437333231343933653935 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.440000 audit: BPF prog-id=115 op=LOAD Jul 2 11:33:30.440000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002efca8 items=0 ppid=2154 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134636361393836663739646362623362366437333231343933653935 Jul 2 11:33:30.441000 audit: BPF prog-id=115 op=UNLOAD Jul 2 11:33:30.441000 audit: BPF prog-id=114 op=UNLOAD Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:30.441000 audit: BPF prog-id=116 op=LOAD Jul 2 11:33:30.441000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002efd38 items=0 ppid=2154 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134636361393836663739646362623362366437333231343933653935 Jul 2 11:33:30.466908 env[1193]: time="2024-07-02T11:33:30.466727458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-rz4wh,Uid:762b31f9-da1a-429c-b08e-f0fd981d1a25,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"24abafc9bb0337c8003b46a4b3d92df241f3117480b05688c96018b055a6fd59\"" Jul 2 11:33:30.472705 env[1193]: time="2024-07-02T11:33:30.472651525Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 11:33:30.474864 env[1193]: time="2024-07-02T11:33:30.474634338Z" level=info msg="StartContainer for \"a4cca986f79dcbb3b6d7321493e9562fcc23d219e186711f4312828135532bac\" returns successfully" Jul 2 11:33:30.803000 audit[2286]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.803000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2c3770a0 a2=0 a3=7ffc2c37708c items=0 ppid=2239 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 11:33:30.805000 audit[2287]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.805000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff61a99630 a2=0 a3=7fff61a9961c items=0 ppid=2239 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 11:33:30.807000 audit[2288]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:30.807000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff941b02d0 a2=0 a3=7fff941b02bc items=0 ppid=2239 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 11:33:30.808000 audit[2289]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.808000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd4e23bf0 a2=0 a3=7fffd4e23bdc items=0 ppid=2239 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 11:33:30.809000 audit[2290]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:30.809000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6aa889c0 a2=0 a3=7ffc6aa889ac items=0 ppid=2239 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 11:33:30.810000 audit[2291]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:30.810000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1a29a430 a2=0 a3=7ffd1a29a41c items=0 ppid=2239 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 11:33:30.918000 audit[2292]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.918000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffce4dbdaa0 a2=0 a3=7ffce4dbda8c items=0 ppid=2239 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 11:33:30.923000 audit[2294]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.923000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd666b90e0 a2=0 a3=7ffd666b90cc items=0 ppid=2239 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 11:33:30.932000 audit[2297]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.932000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc66e31da0 a2=0 a3=7ffc66e31d8c items=0 ppid=2239 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 11:33:30.934000 audit[2298]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.934000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec566b3f0 a2=0 a3=7ffec566b3dc items=0 ppid=2239 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 11:33:30.939000 audit[2300]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.939000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa9597650 a2=0 a3=7fffa959763c items=0 ppid=2239 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 11:33:30.941000 audit[2301]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.941000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd52e2fce0 a2=0 a3=7ffd52e2fccc items=0 ppid=2239 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 11:33:30.950000 audit[2303]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.950000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd26dc5fd0 a2=0 a3=7ffd26dc5fbc items=0 ppid=2239 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 11:33:30.962000 audit[2306]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.962000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4cbc3650 a2=0 a3=7ffd4cbc363c items=0 ppid=2239 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 11:33:30.964000 audit[2307]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.964000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa538e970 a2=0 a3=7fffa538e95c items=0 ppid=2239 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 11:33:30.968000 audit[2309]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.968000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2916b310 a2=0 a3=7ffe2916b2fc items=0 ppid=2239 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 11:33:30.970000 audit[2310]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.970000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfd1c69b0 a2=0 a3=7ffcfd1c699c items=0 ppid=2239 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 11:33:30.977000 audit[2312]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.977000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf3510100 a2=0 a3=7ffcf35100ec items=0 ppid=2239 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 11:33:30.984000 audit[2315]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.984000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd432dcd00 a2=0 a3=7ffd432dccec items=0 ppid=2239 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 11:33:30.990000 audit[2318]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.990000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa433c570 a2=0 a3=7fffa433c55c items=0 ppid=2239 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 11:33:30.992000 audit[2319]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.992000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd38b924f0 a2=0 a3=7ffd38b924dc items=0 ppid=2239 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 11:33:30.997000 audit[2321]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:30.997000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc2ef754c0 a2=0 a3=7ffc2ef754ac items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:30.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 11:33:31.002000 audit[2324]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:31.002000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff00927790 a2=0 a3=7fff0092777c items=0 ppid=2239 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 11:33:31.004000 audit[2325]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:31.004000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe41f86200 a2=0 a3=7ffe41f861ec items=0 ppid=2239 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 11:33:31.008000 audit[2327]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:33:31.008000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe43a662b0 a2=0 a3=7ffe43a6629c items=0 ppid=2239 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 11:33:31.045000 audit[2333]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:31.045000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffec90bbd70 a2=0 a3=7ffec90bbd5c items=0 ppid=2239 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:31.054000 audit[2333]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:31.054000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffec90bbd70 a2=0 a3=7ffec90bbd5c items=0 ppid=2239 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:31.057000 audit[2339]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.057000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff20ba68b0 a2=0 a3=7fff20ba689c items=0 ppid=2239 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 11:33:31.061000 audit[2341]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.061000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc38c1f8c0 a2=0 a3=7ffc38c1f8ac items=0 ppid=2239 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 11:33:31.077000 audit[2344]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.077000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc6940170 a2=0 a3=7ffcc694015c items=0 ppid=2239 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 11:33:31.080000 audit[2345]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.080000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3b796d20 a2=0 a3=7fff3b796d0c items=0 ppid=2239 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 11:33:31.092000 audit[2347]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.092000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe507f1a70 a2=0 a3=7ffe507f1a5c items=0 ppid=2239 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 11:33:31.094000 audit[2348]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.094000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe76270a10 a2=0 a3=7ffe762709fc items=0 ppid=2239 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 11:33:31.105000 audit[2350]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.105000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea5e67f80 a2=0 a3=7ffea5e67f6c items=0 ppid=2239 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 11:33:31.113000 audit[2353]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.113000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff6419c7b0 a2=0 a3=7fff6419c79c items=0 ppid=2239 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 11:33:31.115000 audit[2354]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.115000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3ec5adb0 a2=0 a3=7ffe3ec5ad9c items=0 ppid=2239 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 11:33:31.119000 audit[2356]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.119000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed2fcd980 a2=0 a3=7ffed2fcd96c items=0 ppid=2239 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 11:33:31.121000 audit[2357]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.121000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc27770040 a2=0 a3=7ffc2777002c items=0 ppid=2239 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 11:33:31.125000 audit[2359]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.125000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9c5fb0c0 a2=0 a3=7fff9c5fb0ac items=0 ppid=2239 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 11:33:31.132000 audit[2362]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.132000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2430de50 a2=0 a3=7ffe2430de3c items=0 ppid=2239 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 11:33:31.139000 audit[2365]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.139000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb841b110 a2=0 a3=7ffdb841b0fc items=0 ppid=2239 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 11:33:31.141000 audit[2366]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.141000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1f67c860 a2=0 a3=7fff1f67c84c items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 11:33:31.145000 audit[2368]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.145000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffda55db890 a2=0 a3=7ffda55db87c items=0 ppid=2239 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 11:33:31.150000 audit[2371]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.150000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff9de5d5a0 a2=0 a3=7fff9de5d58c items=0 ppid=2239 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 11:33:31.152000 audit[2372]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.152000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb521f600 a2=0 a3=7ffeb521f5ec items=0 ppid=2239 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 11:33:31.156000 audit[2374]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.156000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff204c9280 a2=0 a3=7fff204c926c items=0 ppid=2239 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 11:33:31.161000 audit[2375]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.161000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff10e869e0 a2=0 a3=7fff10e869cc items=0 ppid=2239 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 11:33:31.165000 audit[2377]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.165000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0d5215e0 a2=0 a3=7ffc0d5215cc items=0 ppid=2239 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 11:33:31.170000 audit[2380]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:33:31.170000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff5f6ad540 a2=0 a3=7fff5f6ad52c items=0 ppid=2239 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 11:33:31.175000 audit[2382]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 11:33:31.175000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd23c5afe0 a2=0 a3=7ffd23c5afcc items=0 ppid=2239 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.175000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:31.176000 audit[2382]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 11:33:31.176000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd23c5afe0 a2=0 a3=7ffd23c5afcc items=0 ppid=2239 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:31.176000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:32.803054 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1930917759.mount: Deactivated successfully. Jul 2 11:33:34.238155 env[1193]: time="2024-07-02T11:33:34.237997960Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:34.241755 env[1193]: time="2024-07-02T11:33:34.241706749Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:34.243820 env[1193]: time="2024-07-02T11:33:34.243786693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:34.244719 env[1193]: time="2024-07-02T11:33:34.244657959Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 11:33:34.248723 env[1193]: time="2024-07-02T11:33:34.248685828Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:34.251937 env[1193]: time="2024-07-02T11:33:34.251889149Z" level=info msg="CreateContainer within sandbox \"24abafc9bb0337c8003b46a4b3d92df241f3117480b05688c96018b055a6fd59\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 11:33:34.275009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2007048668.mount: Deactivated successfully. Jul 2 11:33:34.282701 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2042254055.mount: Deactivated successfully. Jul 2 11:33:34.286863 env[1193]: time="2024-07-02T11:33:34.286818242Z" level=info msg="CreateContainer within sandbox \"24abafc9bb0337c8003b46a4b3d92df241f3117480b05688c96018b055a6fd59\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"acfa2ae22ab4e5cc3fa8d5b7eebf4551aa333f3f6c8a19a82c82540d5443391b\"" Jul 2 11:33:34.289494 env[1193]: time="2024-07-02T11:33:34.289454061Z" level=info msg="StartContainer for \"acfa2ae22ab4e5cc3fa8d5b7eebf4551aa333f3f6c8a19a82c82540d5443391b\"" Jul 2 11:33:34.326873 systemd[1]: Started cri-containerd-acfa2ae22ab4e5cc3fa8d5b7eebf4551aa333f3f6c8a19a82c82540d5443391b.scope. Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.357000 audit: BPF prog-id=117 op=LOAD Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2195 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:34.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163666132616532326162346535636333666138643562376565626634 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2195 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:34.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163666132616532326162346535636333666138643562376565626634 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit: BPF prog-id=118 op=LOAD Jul 2 11:33:34.358000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000243c0 items=0 ppid=2195 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:34.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163666132616532326162346535636333666138643562376565626634 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit: BPF prog-id=119 op=LOAD Jul 2 11:33:34.358000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024408 items=0 ppid=2195 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:34.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163666132616532326162346535636333666138643562376565626634 Jul 2 11:33:34.358000 audit: BPF prog-id=119 op=UNLOAD Jul 2 11:33:34.358000 audit: BPF prog-id=118 op=UNLOAD Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:34.358000 audit: BPF prog-id=120 op=LOAD Jul 2 11:33:34.358000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024818 items=0 ppid=2195 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:34.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163666132616532326162346535636333666138643562376565626634 Jul 2 11:33:34.407646 env[1193]: time="2024-07-02T11:33:34.407572953Z" level=info msg="StartContainer for \"acfa2ae22ab4e5cc3fa8d5b7eebf4551aa333f3f6c8a19a82c82540d5443391b\" returns successfully" Jul 2 11:33:35.104909 kubelet[2066]: I0702 11:33:35.104851 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9lfc2" podStartSLOduration=6.104620233 podStartE2EDuration="6.104620233s" podCreationTimestamp="2024-07-02 11:33:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:33:31.100154791 +0000 UTC m=+13.414545039" watchObservedRunningTime="2024-07-02 11:33:35.104620233 +0000 UTC m=+17.419010480" Jul 2 11:33:35.105762 kubelet[2066]: I0702 11:33:35.105126 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4974c85-rz4wh" podStartSLOduration=2.329609101 podStartE2EDuration="6.10506457s" podCreationTimestamp="2024-07-02 11:33:29 +0000 UTC" firstStartedPulling="2024-07-02 11:33:30.470062009 +0000 UTC m=+12.784452249" lastFinishedPulling="2024-07-02 11:33:34.245517473 +0000 UTC m=+16.559907718" observedRunningTime="2024-07-02 11:33:35.102770435 +0000 UTC m=+17.417160684" watchObservedRunningTime="2024-07-02 11:33:35.10506457 +0000 UTC m=+17.419454829" Jul 2 11:33:37.729000 audit[2426]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:37.733131 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 2 11:33:37.733277 kernel: audit: type=1325 audit(1719920017.729:944): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:37.729000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff0def0bb0 a2=0 a3=7fff0def0b9c items=0 ppid=2239 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:37.745332 kernel: audit: type=1300 audit(1719920017.729:944): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff0def0bb0 a2=0 a3=7fff0def0b9c items=0 ppid=2239 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:37.745448 kernel: audit: type=1327 audit(1719920017.729:944): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:37.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:37.731000 audit[2426]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:37.731000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff0def0bb0 a2=0 a3=0 items=0 ppid=2239 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:37.762488 kernel: audit: type=1325 audit(1719920017.731:945): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:37.762562 kernel: audit: type=1300 audit(1719920017.731:945): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff0def0bb0 a2=0 a3=0 items=0 ppid=2239 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:37.762654 kernel: audit: type=1327 audit(1719920017.731:945): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:37.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:37.760000 audit[2428]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:37.771694 kernel: audit: type=1325 audit(1719920017.760:946): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:37.760000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc6bad5ed0 a2=0 a3=7ffc6bad5ebc items=0 ppid=2239 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:37.780694 kernel: audit: type=1300 audit(1719920017.760:946): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc6bad5ed0 a2=0 a3=7ffc6bad5ebc items=0 ppid=2239 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:37.780810 kernel: audit: type=1327 audit(1719920017.760:946): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:37.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:37.784713 kernel: audit: type=1325 audit(1719920017.762:947): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:37.762000 audit[2428]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:37.762000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc6bad5ed0 a2=0 a3=0 items=0 ppid=2239 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:37.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:37.880145 kubelet[2066]: I0702 11:33:37.880090 2066 topology_manager.go:215] "Topology Admit Handler" podUID="74935ede-bc78-4f46-b32f-ca7c049e72dc" podNamespace="calico-system" podName="calico-typha-66fb8c688-9d2s2" Jul 2 11:33:37.887958 systemd[1]: Created slice kubepods-besteffort-pod74935ede_bc78_4f46_b32f_ca7c049e72dc.slice. Jul 2 11:33:37.889760 kubelet[2066]: I0702 11:33:37.889717 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/74935ede-bc78-4f46-b32f-ca7c049e72dc-typha-certs\") pod \"calico-typha-66fb8c688-9d2s2\" (UID: \"74935ede-bc78-4f46-b32f-ca7c049e72dc\") " pod="calico-system/calico-typha-66fb8c688-9d2s2" Jul 2 11:33:37.889977 kubelet[2066]: I0702 11:33:37.889943 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/74935ede-bc78-4f46-b32f-ca7c049e72dc-tigera-ca-bundle\") pod \"calico-typha-66fb8c688-9d2s2\" (UID: \"74935ede-bc78-4f46-b32f-ca7c049e72dc\") " pod="calico-system/calico-typha-66fb8c688-9d2s2" Jul 2 11:33:37.890180 kubelet[2066]: I0702 11:33:37.890144 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8zjld\" (UniqueName: \"kubernetes.io/projected/74935ede-bc78-4f46-b32f-ca7c049e72dc-kube-api-access-8zjld\") pod \"calico-typha-66fb8c688-9d2s2\" (UID: \"74935ede-bc78-4f46-b32f-ca7c049e72dc\") " pod="calico-system/calico-typha-66fb8c688-9d2s2" Jul 2 11:33:38.160515 kubelet[2066]: I0702 11:33:38.160249 2066 topology_manager.go:215] "Topology Admit Handler" podUID="e79a35a9-43da-4202-8823-98cea74b8d95" podNamespace="calico-system" podName="calico-node-pn44c" Jul 2 11:33:38.173537 systemd[1]: Created slice kubepods-besteffort-pode79a35a9_43da_4202_8823_98cea74b8d95.slice. Jul 2 11:33:38.185022 kubelet[2066]: W0702 11:33:38.184981 2066 reflector.go:539] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:srv-z4l15.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'srv-z4l15.gb1.brightbox.com' and this object Jul 2 11:33:38.185446 kubelet[2066]: E0702 11:33:38.185410 2066 reflector.go:147] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:srv-z4l15.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'srv-z4l15.gb1.brightbox.com' and this object Jul 2 11:33:38.186663 kubelet[2066]: W0702 11:33:38.186635 2066 reflector.go:539] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:srv-z4l15.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-z4l15.gb1.brightbox.com' and this object Jul 2 11:33:38.186853 kubelet[2066]: E0702 11:33:38.186829 2066 reflector.go:147] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:srv-z4l15.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-z4l15.gb1.brightbox.com' and this object Jul 2 11:33:38.198007 env[1193]: time="2024-07-02T11:33:38.197362111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66fb8c688-9d2s2,Uid:74935ede-bc78-4f46-b32f-ca7c049e72dc,Namespace:calico-system,Attempt:0,}" Jul 2 11:33:38.270872 env[1193]: time="2024-07-02T11:33:38.270697563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:33:38.271290 env[1193]: time="2024-07-02T11:33:38.270832998Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:33:38.271290 env[1193]: time="2024-07-02T11:33:38.270871850Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:33:38.271929 env[1193]: time="2024-07-02T11:33:38.271807843Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efc0eca49768903f73b2397933fc5c774c81c681cc43ded2fa5b85c1cb7811ca pid=2437 runtime=io.containerd.runc.v2 Jul 2 11:33:38.305873 systemd[1]: Started cri-containerd-efc0eca49768903f73b2397933fc5c774c81c681cc43ded2fa5b85c1cb7811ca.scope. Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.340000 audit: BPF prog-id=121 op=LOAD Jul 2 11:33:38.344143 kubelet[2066]: I0702 11:33:38.342721 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-lib-modules\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.344143 kubelet[2066]: I0702 11:33:38.342776 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-policysync\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.344143 kubelet[2066]: I0702 11:33:38.342817 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e79a35a9-43da-4202-8823-98cea74b8d95-tigera-ca-bundle\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.344143 kubelet[2066]: I0702 11:33:38.342853 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-xtables-lock\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.344143 kubelet[2066]: I0702 11:33:38.342893 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-cni-net-dir\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2437 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:38.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633065636134393736383930336637336232333937393333666335 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2437 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:38.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633065636134393736383930336637336232333937393333666335 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.342000 audit: BPF prog-id=122 op=LOAD Jul 2 11:33:38.342000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000355f10 items=0 ppid=2437 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:38.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633065636134393736383930336637336232333937393333666335 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit: BPF prog-id=123 op=LOAD Jul 2 11:33:38.343000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000355f58 items=0 ppid=2437 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:38.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633065636134393736383930336637336232333937393333666335 Jul 2 11:33:38.343000 audit: BPF prog-id=123 op=UNLOAD Jul 2 11:33:38.343000 audit: BPF prog-id=122 op=UNLOAD Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:38.343000 audit: BPF prog-id=124 op=LOAD Jul 2 11:33:38.343000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d8368 items=0 ppid=2437 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:38.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633065636134393736383930336637336232333937393333666335 Jul 2 11:33:38.350056 kubelet[2066]: I0702 11:33:38.342991 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-flexvol-driver-host\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.350056 kubelet[2066]: I0702 11:33:38.343111 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-var-run-calico\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.350056 kubelet[2066]: I0702 11:33:38.343178 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-cni-bin-dir\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.350056 kubelet[2066]: I0702 11:33:38.343242 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-var-lib-calico\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.350056 kubelet[2066]: I0702 11:33:38.343284 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r8rtk\" (UniqueName: \"kubernetes.io/projected/e79a35a9-43da-4202-8823-98cea74b8d95-kube-api-access-r8rtk\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.350357 kubelet[2066]: I0702 11:33:38.343372 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e79a35a9-43da-4202-8823-98cea74b8d95-node-certs\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.350357 kubelet[2066]: I0702 11:33:38.343422 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e79a35a9-43da-4202-8823-98cea74b8d95-cni-log-dir\") pod \"calico-node-pn44c\" (UID: \"e79a35a9-43da-4202-8823-98cea74b8d95\") " pod="calico-system/calico-node-pn44c" Jul 2 11:33:38.373058 kubelet[2066]: I0702 11:33:38.372451 2066 topology_manager.go:215] "Topology Admit Handler" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" podNamespace="calico-system" podName="csi-node-driver-q75b8" Jul 2 11:33:38.373058 kubelet[2066]: E0702 11:33:38.372851 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:38.444234 kubelet[2066]: I0702 11:33:38.444098 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8r284\" (UniqueName: \"kubernetes.io/projected/1908f106-f0a8-4f1e-9abc-20ce87803b86-kube-api-access-8r284\") pod \"csi-node-driver-q75b8\" (UID: \"1908f106-f0a8-4f1e-9abc-20ce87803b86\") " pod="calico-system/csi-node-driver-q75b8" Jul 2 11:33:38.444234 kubelet[2066]: I0702 11:33:38.444166 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1908f106-f0a8-4f1e-9abc-20ce87803b86-varrun\") pod \"csi-node-driver-q75b8\" (UID: \"1908f106-f0a8-4f1e-9abc-20ce87803b86\") " pod="calico-system/csi-node-driver-q75b8" Jul 2 11:33:38.444505 kubelet[2066]: I0702 11:33:38.444257 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1908f106-f0a8-4f1e-9abc-20ce87803b86-kubelet-dir\") pod \"csi-node-driver-q75b8\" (UID: \"1908f106-f0a8-4f1e-9abc-20ce87803b86\") " pod="calico-system/csi-node-driver-q75b8" Jul 2 11:33:38.444505 kubelet[2066]: I0702 11:33:38.444294 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1908f106-f0a8-4f1e-9abc-20ce87803b86-registration-dir\") pod \"csi-node-driver-q75b8\" (UID: \"1908f106-f0a8-4f1e-9abc-20ce87803b86\") " pod="calico-system/csi-node-driver-q75b8" Jul 2 11:33:38.444505 kubelet[2066]: I0702 11:33:38.444356 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1908f106-f0a8-4f1e-9abc-20ce87803b86-socket-dir\") pod \"csi-node-driver-q75b8\" (UID: \"1908f106-f0a8-4f1e-9abc-20ce87803b86\") " pod="calico-system/csi-node-driver-q75b8" Jul 2 11:33:38.449591 kubelet[2066]: E0702 11:33:38.449557 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.449706 kubelet[2066]: W0702 11:33:38.449589 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.449706 kubelet[2066]: E0702 11:33:38.449635 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.479590 kubelet[2066]: E0702 11:33:38.479554 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.479590 kubelet[2066]: W0702 11:33:38.479584 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.479860 kubelet[2066]: E0702 11:33:38.479612 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.495183 env[1193]: time="2024-07-02T11:33:38.494864182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66fb8c688-9d2s2,Uid:74935ede-bc78-4f46-b32f-ca7c049e72dc,Namespace:calico-system,Attempt:0,} returns sandbox id \"efc0eca49768903f73b2397933fc5c774c81c681cc43ded2fa5b85c1cb7811ca\"" Jul 2 11:33:38.499141 env[1193]: time="2024-07-02T11:33:38.497721256Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 11:33:38.545982 kubelet[2066]: E0702 11:33:38.545917 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.545982 kubelet[2066]: W0702 11:33:38.545970 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.546244 kubelet[2066]: E0702 11:33:38.545999 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.546341 kubelet[2066]: E0702 11:33:38.546330 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.546415 kubelet[2066]: W0702 11:33:38.546346 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.546415 kubelet[2066]: E0702 11:33:38.546364 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.546653 kubelet[2066]: E0702 11:33:38.546626 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.546743 kubelet[2066]: W0702 11:33:38.546656 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.546743 kubelet[2066]: E0702 11:33:38.546698 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.547069 kubelet[2066]: E0702 11:33:38.547042 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.547069 kubelet[2066]: W0702 11:33:38.547061 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.547195 kubelet[2066]: E0702 11:33:38.547085 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.547401 kubelet[2066]: E0702 11:33:38.547369 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.547401 kubelet[2066]: W0702 11:33:38.547395 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.547555 kubelet[2066]: E0702 11:33:38.547415 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.547885 kubelet[2066]: E0702 11:33:38.547860 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.547885 kubelet[2066]: W0702 11:33:38.547879 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.548063 kubelet[2066]: E0702 11:33:38.548035 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.548333 kubelet[2066]: E0702 11:33:38.548284 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.548333 kubelet[2066]: W0702 11:33:38.548302 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.548481 kubelet[2066]: E0702 11:33:38.548457 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.548843 kubelet[2066]: E0702 11:33:38.548632 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.548843 kubelet[2066]: W0702 11:33:38.548650 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.548843 kubelet[2066]: E0702 11:33:38.548776 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.549106 kubelet[2066]: E0702 11:33:38.548931 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.549106 kubelet[2066]: W0702 11:33:38.548956 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.549106 kubelet[2066]: E0702 11:33:38.549067 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.549245 kubelet[2066]: E0702 11:33:38.549218 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.549245 kubelet[2066]: W0702 11:33:38.549229 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.549387 kubelet[2066]: E0702 11:33:38.549363 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.549552 kubelet[2066]: E0702 11:33:38.549530 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.549552 kubelet[2066]: W0702 11:33:38.549548 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.549742 kubelet[2066]: E0702 11:33:38.549710 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.549915 kubelet[2066]: E0702 11:33:38.549888 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.549915 kubelet[2066]: W0702 11:33:38.549906 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.550092 kubelet[2066]: E0702 11:33:38.550044 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.550275 kubelet[2066]: E0702 11:33:38.550250 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.550275 kubelet[2066]: W0702 11:33:38.550267 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.550423 kubelet[2066]: E0702 11:33:38.550394 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.550572 kubelet[2066]: E0702 11:33:38.550549 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.550572 kubelet[2066]: W0702 11:33:38.550567 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.550776 kubelet[2066]: E0702 11:33:38.550717 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.550907 kubelet[2066]: E0702 11:33:38.550880 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.550907 kubelet[2066]: W0702 11:33:38.550900 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.551058 kubelet[2066]: E0702 11:33:38.551013 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.551215 kubelet[2066]: E0702 11:33:38.551193 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.551215 kubelet[2066]: W0702 11:33:38.551209 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.551394 kubelet[2066]: E0702 11:33:38.551344 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.551533 kubelet[2066]: E0702 11:33:38.551512 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.551533 kubelet[2066]: W0702 11:33:38.551530 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.551705 kubelet[2066]: E0702 11:33:38.551636 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.551881 kubelet[2066]: E0702 11:33:38.551858 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.551881 kubelet[2066]: W0702 11:33:38.551877 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.552008 kubelet[2066]: E0702 11:33:38.551981 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.552183 kubelet[2066]: E0702 11:33:38.552162 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.552183 kubelet[2066]: W0702 11:33:38.552179 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.552389 kubelet[2066]: E0702 11:33:38.552314 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.552564 kubelet[2066]: E0702 11:33:38.552539 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.552564 kubelet[2066]: W0702 11:33:38.552558 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.552909 kubelet[2066]: E0702 11:33:38.552859 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.553028 kubelet[2066]: E0702 11:33:38.553009 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.553121 kubelet[2066]: W0702 11:33:38.553028 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.553284 kubelet[2066]: E0702 11:33:38.553224 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.553396 kubelet[2066]: E0702 11:33:38.553383 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.553470 kubelet[2066]: W0702 11:33:38.553397 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.553540 kubelet[2066]: E0702 11:33:38.553514 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.553754 kubelet[2066]: E0702 11:33:38.553732 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.553754 kubelet[2066]: W0702 11:33:38.553750 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.553904 kubelet[2066]: E0702 11:33:38.553889 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.554097 kubelet[2066]: E0702 11:33:38.554075 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.554097 kubelet[2066]: W0702 11:33:38.554095 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.554273 kubelet[2066]: E0702 11:33:38.554121 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.554458 kubelet[2066]: E0702 11:33:38.554437 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.554458 kubelet[2066]: W0702 11:33:38.554455 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.554582 kubelet[2066]: E0702 11:33:38.554480 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.555959 kubelet[2066]: E0702 11:33:38.555042 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.555959 kubelet[2066]: W0702 11:33:38.555063 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.555959 kubelet[2066]: E0702 11:33:38.555082 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.568748 kubelet[2066]: E0702 11:33:38.568712 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.568748 kubelet[2066]: W0702 11:33:38.568738 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.568982 kubelet[2066]: E0702 11:33:38.568761 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.648979 kubelet[2066]: E0702 11:33:38.648931 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.648979 kubelet[2066]: W0702 11:33:38.648957 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.649256 kubelet[2066]: E0702 11:33:38.648998 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.754005 kubelet[2066]: E0702 11:33:38.753911 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.754463 kubelet[2066]: W0702 11:33:38.754428 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.754659 kubelet[2066]: E0702 11:33:38.754618 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.789000 audit[2506]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:38.789000 audit[2506]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff6edae8a0 a2=0 a3=7fff6edae88c items=0 ppid=2239 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:38.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:38.791000 audit[2506]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:38.791000 audit[2506]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff6edae8a0 a2=0 a3=0 items=0 ppid=2239 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:38.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:38.856498 kubelet[2066]: E0702 11:33:38.856459 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.857079 kubelet[2066]: W0702 11:33:38.857049 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.857240 kubelet[2066]: E0702 11:33:38.857215 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:38.958122 kubelet[2066]: E0702 11:33:38.958063 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:38.958122 kubelet[2066]: W0702 11:33:38.958098 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:38.958122 kubelet[2066]: E0702 11:33:38.958129 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.059646 kubelet[2066]: E0702 11:33:39.059508 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.059897 kubelet[2066]: W0702 11:33:39.059867 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.060043 kubelet[2066]: E0702 11:33:39.060018 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.161833 kubelet[2066]: E0702 11:33:39.161792 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.161833 kubelet[2066]: W0702 11:33:39.161824 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.162099 kubelet[2066]: E0702 11:33:39.161854 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.263485 kubelet[2066]: E0702 11:33:39.263347 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.263485 kubelet[2066]: W0702 11:33:39.263378 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.263485 kubelet[2066]: E0702 11:33:39.263423 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.364353 kubelet[2066]: E0702 11:33:39.364109 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.364353 kubelet[2066]: W0702 11:33:39.364151 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.364353 kubelet[2066]: E0702 11:33:39.364180 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.446883 kubelet[2066]: E0702 11:33:39.446816 2066 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition Jul 2 11:33:39.447133 kubelet[2066]: E0702 11:33:39.447071 2066 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e79a35a9-43da-4202-8823-98cea74b8d95-node-certs podName:e79a35a9-43da-4202-8823-98cea74b8d95 nodeName:}" failed. No retries permitted until 2024-07-02 11:33:39.94701347 +0000 UTC m=+22.261403706 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/e79a35a9-43da-4202-8823-98cea74b8d95-node-certs") pod "calico-node-pn44c" (UID: "e79a35a9-43da-4202-8823-98cea74b8d95") : failed to sync secret cache: timed out waiting for the condition Jul 2 11:33:39.465269 kubelet[2066]: E0702 11:33:39.465228 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.465540 kubelet[2066]: W0702 11:33:39.465510 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.465726 kubelet[2066]: E0702 11:33:39.465699 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.566970 kubelet[2066]: E0702 11:33:39.566931 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.567252 kubelet[2066]: W0702 11:33:39.567224 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.567402 kubelet[2066]: E0702 11:33:39.567378 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.669237 kubelet[2066]: E0702 11:33:39.669069 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.669731 kubelet[2066]: W0702 11:33:39.669700 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.669903 kubelet[2066]: E0702 11:33:39.669864 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.771358 kubelet[2066]: E0702 11:33:39.771306 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.771619 kubelet[2066]: W0702 11:33:39.771590 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.771860 kubelet[2066]: E0702 11:33:39.771823 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.873630 kubelet[2066]: E0702 11:33:39.873581 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.873630 kubelet[2066]: W0702 11:33:39.873620 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.873630 kubelet[2066]: E0702 11:33:39.873653 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.947551 kubelet[2066]: E0702 11:33:39.947497 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:39.975234 kubelet[2066]: E0702 11:33:39.975174 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.975234 kubelet[2066]: W0702 11:33:39.975224 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.975951 kubelet[2066]: E0702 11:33:39.975261 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.975951 kubelet[2066]: E0702 11:33:39.975823 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.975951 kubelet[2066]: W0702 11:33:39.975839 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.975951 kubelet[2066]: E0702 11:33:39.975859 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.976197 kubelet[2066]: E0702 11:33:39.976133 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.976197 kubelet[2066]: W0702 11:33:39.976148 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.976197 kubelet[2066]: E0702 11:33:39.976165 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.976455 kubelet[2066]: E0702 11:33:39.976428 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.976455 kubelet[2066]: W0702 11:33:39.976450 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.976632 kubelet[2066]: E0702 11:33:39.976468 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.976881 kubelet[2066]: E0702 11:33:39.976856 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.976881 kubelet[2066]: W0702 11:33:39.976877 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.977048 kubelet[2066]: E0702 11:33:39.976896 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:39.990409 kubelet[2066]: E0702 11:33:39.990380 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:39.990409 kubelet[2066]: W0702 11:33:39.990405 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:39.990579 kubelet[2066]: E0702 11:33:39.990427 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:40.280569 env[1193]: time="2024-07-02T11:33:40.280372669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pn44c,Uid:e79a35a9-43da-4202-8823-98cea74b8d95,Namespace:calico-system,Attempt:0,}" Jul 2 11:33:40.334308 env[1193]: time="2024-07-02T11:33:40.334125093Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:33:40.334618 env[1193]: time="2024-07-02T11:33:40.334544437Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:33:40.334868 env[1193]: time="2024-07-02T11:33:40.334822516Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:33:40.335777 env[1193]: time="2024-07-02T11:33:40.335679678Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb pid=2533 runtime=io.containerd.runc.v2 Jul 2 11:33:40.376477 systemd[1]: Started cri-containerd-15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb.scope. Jul 2 11:33:40.390640 systemd[1]: run-containerd-runc-k8s.io-15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb-runc.5yYxpg.mount: Deactivated successfully. Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.506000 audit: BPF prog-id=125 op=LOAD Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2533 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:40.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613565663433393363393034373038643564346332346238353131 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2533 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:40.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613565663433393363393034373038643564346332346238353131 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.508000 audit: BPF prog-id=126 op=LOAD Jul 2 11:33:40.508000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000385070 items=0 ppid=2533 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:40.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613565663433393363393034373038643564346332346238353131 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit: BPF prog-id=127 op=LOAD Jul 2 11:33:40.509000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003850b8 items=0 ppid=2533 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:40.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613565663433393363393034373038643564346332346238353131 Jul 2 11:33:40.509000 audit: BPF prog-id=127 op=UNLOAD Jul 2 11:33:40.509000 audit: BPF prog-id=126 op=UNLOAD Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:40.509000 audit: BPF prog-id=128 op=LOAD Jul 2 11:33:40.509000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003854c8 items=0 ppid=2533 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:40.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613565663433393363393034373038643564346332346238353131 Jul 2 11:33:40.558007 env[1193]: time="2024-07-02T11:33:40.557853946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pn44c,Uid:e79a35a9-43da-4202-8823-98cea74b8d95,Namespace:calico-system,Attempt:0,} returns sandbox id \"15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb\"" Jul 2 11:33:41.948509 kubelet[2066]: E0702 11:33:41.948436 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:42.313354 env[1193]: time="2024-07-02T11:33:42.313054305Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:42.316042 env[1193]: time="2024-07-02T11:33:42.315999994Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:42.318791 env[1193]: time="2024-07-02T11:33:42.318752540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:42.321830 env[1193]: time="2024-07-02T11:33:42.321794272Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:42.322662 env[1193]: time="2024-07-02T11:33:42.322618047Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 11:33:42.327714 env[1193]: time="2024-07-02T11:33:42.325996006Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 11:33:42.363688 env[1193]: time="2024-07-02T11:33:42.363588056Z" level=info msg="CreateContainer within sandbox \"efc0eca49768903f73b2397933fc5c774c81c681cc43ded2fa5b85c1cb7811ca\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 11:33:42.382977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3838672002.mount: Deactivated successfully. Jul 2 11:33:42.388531 env[1193]: time="2024-07-02T11:33:42.388467934Z" level=info msg="CreateContainer within sandbox \"efc0eca49768903f73b2397933fc5c774c81c681cc43ded2fa5b85c1cb7811ca\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6e973ca39793add9e216eb6c6cc281f812139a17a5a1d558aba3b726dfcb3f0a\"" Jul 2 11:33:42.392517 env[1193]: time="2024-07-02T11:33:42.392467199Z" level=info msg="StartContainer for \"6e973ca39793add9e216eb6c6cc281f812139a17a5a1d558aba3b726dfcb3f0a\"" Jul 2 11:33:42.439147 systemd[1]: Started cri-containerd-6e973ca39793add9e216eb6c6cc281f812139a17a5a1d558aba3b726dfcb3f0a.scope. Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.482000 audit: BPF prog-id=129 op=LOAD Jul 2 11:33:42.483000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.483000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2437 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:42.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665393733636133393739336164643965323136656236633663633238 Jul 2 11:33:42.484000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.484000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2437 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:42.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665393733636133393739336164643965323136656236633663633238 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.485000 audit: BPF prog-id=130 op=LOAD Jul 2 11:33:42.485000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a05c0 items=0 ppid=2437 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:42.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665393733636133393739336164643965323136656236633663633238 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.486000 audit: BPF prog-id=131 op=LOAD Jul 2 11:33:42.486000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a0608 items=0 ppid=2437 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:42.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665393733636133393739336164643965323136656236633663633238 Jul 2 11:33:42.487000 audit: BPF prog-id=131 op=UNLOAD Jul 2 11:33:42.487000 audit: BPF prog-id=130 op=UNLOAD Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:42.487000 audit: BPF prog-id=132 op=LOAD Jul 2 11:33:42.487000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a0a18 items=0 ppid=2437 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:42.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665393733636133393739336164643965323136656236633663633238 Jul 2 11:33:42.547304 env[1193]: time="2024-07-02T11:33:42.547235981Z" level=info msg="StartContainer for \"6e973ca39793add9e216eb6c6cc281f812139a17a5a1d558aba3b726dfcb3f0a\" returns successfully" Jul 2 11:33:43.128475 kubelet[2066]: I0702 11:33:43.128407 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-66fb8c688-9d2s2" podStartSLOduration=2.301924755 podStartE2EDuration="6.128304275s" podCreationTimestamp="2024-07-02 11:33:37 +0000 UTC" firstStartedPulling="2024-07-02 11:33:38.497192307 +0000 UTC m=+20.811582547" lastFinishedPulling="2024-07-02 11:33:42.323571821 +0000 UTC m=+24.637962067" observedRunningTime="2024-07-02 11:33:43.125572124 +0000 UTC m=+25.439962391" watchObservedRunningTime="2024-07-02 11:33:43.128304275 +0000 UTC m=+25.442694514" Jul 2 11:33:43.175079 kubelet[2066]: E0702 11:33:43.175000 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.175470 kubelet[2066]: W0702 11:33:43.175430 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.175662 kubelet[2066]: E0702 11:33:43.175633 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.176646 kubelet[2066]: E0702 11:33:43.176622 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.176879 kubelet[2066]: W0702 11:33:43.176843 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.177058 kubelet[2066]: E0702 11:33:43.177022 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.177602 kubelet[2066]: E0702 11:33:43.177579 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.177750 kubelet[2066]: W0702 11:33:43.177725 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.177900 kubelet[2066]: E0702 11:33:43.177868 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.178368 kubelet[2066]: E0702 11:33:43.178346 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.178522 kubelet[2066]: W0702 11:33:43.178497 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.178708 kubelet[2066]: E0702 11:33:43.178662 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.179568 kubelet[2066]: E0702 11:33:43.179536 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.179763 kubelet[2066]: W0702 11:33:43.179728 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.180048 kubelet[2066]: E0702 11:33:43.179864 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.180492 kubelet[2066]: E0702 11:33:43.180432 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.180637 kubelet[2066]: W0702 11:33:43.180612 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.180828 kubelet[2066]: E0702 11:33:43.180803 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.183778 kubelet[2066]: E0702 11:33:43.183754 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.183954 kubelet[2066]: W0702 11:33:43.183928 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.184074 kubelet[2066]: E0702 11:33:43.184052 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.184562 kubelet[2066]: E0702 11:33:43.184538 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.184744 kubelet[2066]: W0702 11:33:43.184718 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.184882 kubelet[2066]: E0702 11:33:43.184859 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.185587 kubelet[2066]: E0702 11:33:43.185564 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.185722 kubelet[2066]: W0702 11:33:43.185696 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.185883 kubelet[2066]: E0702 11:33:43.185859 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.186332 kubelet[2066]: E0702 11:33:43.186311 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.186477 kubelet[2066]: W0702 11:33:43.186452 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.186600 kubelet[2066]: E0702 11:33:43.186578 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.187077 kubelet[2066]: E0702 11:33:43.187055 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.187234 kubelet[2066]: W0702 11:33:43.187208 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.187440 kubelet[2066]: E0702 11:33:43.187417 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.187881 kubelet[2066]: E0702 11:33:43.187860 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.188028 kubelet[2066]: W0702 11:33:43.188004 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.188161 kubelet[2066]: E0702 11:33:43.188138 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.188584 kubelet[2066]: E0702 11:33:43.188564 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.188738 kubelet[2066]: W0702 11:33:43.188714 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.188897 kubelet[2066]: E0702 11:33:43.188871 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.189297 kubelet[2066]: E0702 11:33:43.189276 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.189427 kubelet[2066]: W0702 11:33:43.189403 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.189567 kubelet[2066]: E0702 11:33:43.189545 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.189949 kubelet[2066]: E0702 11:33:43.189929 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.190086 kubelet[2066]: W0702 11:33:43.190061 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.190249 kubelet[2066]: E0702 11:33:43.190226 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.216730 kubelet[2066]: E0702 11:33:43.216661 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.216730 kubelet[2066]: W0702 11:33:43.216715 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.217099 kubelet[2066]: E0702 11:33:43.216757 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.217246 kubelet[2066]: E0702 11:33:43.217218 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.217246 kubelet[2066]: W0702 11:33:43.217244 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.217527 kubelet[2066]: E0702 11:33:43.217273 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.217694 kubelet[2066]: E0702 11:33:43.217632 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.217694 kubelet[2066]: W0702 11:33:43.217652 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.217838 kubelet[2066]: E0702 11:33:43.217717 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.218110 kubelet[2066]: E0702 11:33:43.218073 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.218110 kubelet[2066]: W0702 11:33:43.218094 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.218307 kubelet[2066]: E0702 11:33:43.218128 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.218495 kubelet[2066]: E0702 11:33:43.218451 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.218495 kubelet[2066]: W0702 11:33:43.218471 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.218620 kubelet[2066]: E0702 11:33:43.218584 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.218792 kubelet[2066]: E0702 11:33:43.218766 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.218792 kubelet[2066]: W0702 11:33:43.218784 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.218952 kubelet[2066]: E0702 11:33:43.218913 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.219128 kubelet[2066]: E0702 11:33:43.219103 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.219128 kubelet[2066]: W0702 11:33:43.219120 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.219277 kubelet[2066]: E0702 11:33:43.219256 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.219453 kubelet[2066]: E0702 11:33:43.219429 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.219453 kubelet[2066]: W0702 11:33:43.219446 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.219598 kubelet[2066]: E0702 11:33:43.219474 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.219829 kubelet[2066]: E0702 11:33:43.219804 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.219829 kubelet[2066]: W0702 11:33:43.219822 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.219960 kubelet[2066]: E0702 11:33:43.219847 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.220498 kubelet[2066]: E0702 11:33:43.220461 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.220498 kubelet[2066]: W0702 11:33:43.220485 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.220735 kubelet[2066]: E0702 11:33:43.220706 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.220962 kubelet[2066]: E0702 11:33:43.220759 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.221120 kubelet[2066]: W0702 11:33:43.221094 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.221346 kubelet[2066]: E0702 11:33:43.221317 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.221833 kubelet[2066]: E0702 11:33:43.221807 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.221981 kubelet[2066]: W0702 11:33:43.221956 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.222217 kubelet[2066]: E0702 11:33:43.222182 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.223025 kubelet[2066]: E0702 11:33:43.222488 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.223025 kubelet[2066]: W0702 11:33:43.222508 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.223025 kubelet[2066]: E0702 11:33:43.222538 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.223025 kubelet[2066]: E0702 11:33:43.222846 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.223025 kubelet[2066]: W0702 11:33:43.222860 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.223025 kubelet[2066]: E0702 11:33:43.222878 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.223785 kubelet[2066]: E0702 11:33:43.223760 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.223785 kubelet[2066]: W0702 11:33:43.223780 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.223934 kubelet[2066]: E0702 11:33:43.223911 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.224174 kubelet[2066]: E0702 11:33:43.224108 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.224174 kubelet[2066]: W0702 11:33:43.224128 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.224174 kubelet[2066]: E0702 11:33:43.224146 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.224520 kubelet[2066]: E0702 11:33:43.224467 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.224520 kubelet[2066]: W0702 11:33:43.224481 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.224520 kubelet[2066]: E0702 11:33:43.224498 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.226631 kubelet[2066]: E0702 11:33:43.225961 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:43.226631 kubelet[2066]: W0702 11:33:43.225981 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:43.226631 kubelet[2066]: E0702 11:33:43.226001 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:43.947988 kubelet[2066]: E0702 11:33:43.947924 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:44.113361 kubelet[2066]: I0702 11:33:44.113308 2066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 11:33:44.197337 env[1193]: time="2024-07-02T11:33:44.197205144Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:44.199434 kubelet[2066]: E0702 11:33:44.199091 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.199434 kubelet[2066]: W0702 11:33:44.199129 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.199434 kubelet[2066]: E0702 11:33:44.199213 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.201589 kubelet[2066]: E0702 11:33:44.200019 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.201589 kubelet[2066]: W0702 11:33:44.200035 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.201589 kubelet[2066]: E0702 11:33:44.200054 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.201589 kubelet[2066]: E0702 11:33:44.200376 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.201589 kubelet[2066]: W0702 11:33:44.200391 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.201589 kubelet[2066]: E0702 11:33:44.200410 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.201589 kubelet[2066]: E0702 11:33:44.200715 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.201589 kubelet[2066]: W0702 11:33:44.200740 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.201589 kubelet[2066]: E0702 11:33:44.200758 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.201589 kubelet[2066]: E0702 11:33:44.201050 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.202211 kubelet[2066]: W0702 11:33:44.201065 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.202211 kubelet[2066]: E0702 11:33:44.201083 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.203481 env[1193]: time="2024-07-02T11:33:44.201012761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 11:33:44.203481 env[1193]: time="2024-07-02T11:33:44.202905712Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:44.203646 kubelet[2066]: E0702 11:33:44.202441 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.203646 kubelet[2066]: W0702 11:33:44.202456 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.203646 kubelet[2066]: E0702 11:33:44.202475 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.205511 env[1193]: time="2024-07-02T11:33:44.203905779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:44.205511 env[1193]: time="2024-07-02T11:33:44.204870048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:44.207262 kubelet[2066]: E0702 11:33:44.207237 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.208147 kubelet[2066]: W0702 11:33:44.208119 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.209015 kubelet[2066]: E0702 11:33:44.208988 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.209519 kubelet[2066]: E0702 11:33:44.209496 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.209658 kubelet[2066]: W0702 11:33:44.209632 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.209816 kubelet[2066]: E0702 11:33:44.209792 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.210244 kubelet[2066]: E0702 11:33:44.210221 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.210429 env[1193]: time="2024-07-02T11:33:44.210368075Z" level=info msg="CreateContainer within sandbox \"15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 11:33:44.210560 kubelet[2066]: W0702 11:33:44.210411 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.210733 kubelet[2066]: E0702 11:33:44.210710 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.211920 kubelet[2066]: E0702 11:33:44.211896 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.212060 kubelet[2066]: W0702 11:33:44.212034 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.212207 kubelet[2066]: E0702 11:33:44.212183 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.212702 kubelet[2066]: E0702 11:33:44.212680 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.212841 kubelet[2066]: W0702 11:33:44.212815 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.212989 kubelet[2066]: E0702 11:33:44.212966 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.213497 kubelet[2066]: E0702 11:33:44.213475 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.213630 kubelet[2066]: W0702 11:33:44.213605 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.213838 kubelet[2066]: E0702 11:33:44.213815 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.214214 kubelet[2066]: E0702 11:33:44.214191 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.214337 kubelet[2066]: W0702 11:33:44.214312 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.214488 kubelet[2066]: E0702 11:33:44.214464 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.214994 kubelet[2066]: E0702 11:33:44.214972 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.215132 kubelet[2066]: W0702 11:33:44.215106 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.215265 kubelet[2066]: E0702 11:33:44.215242 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.215613 kubelet[2066]: E0702 11:33:44.215592 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.215797 kubelet[2066]: W0702 11:33:44.215759 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.215925 kubelet[2066]: E0702 11:33:44.215902 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.225272 kubelet[2066]: E0702 11:33:44.225224 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.225272 kubelet[2066]: W0702 11:33:44.225252 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.225539 kubelet[2066]: E0702 11:33:44.225286 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.234805 kubelet[2066]: E0702 11:33:44.234301 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.234805 kubelet[2066]: W0702 11:33:44.234326 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.234805 kubelet[2066]: E0702 11:33:44.234359 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.235378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3452674101.mount: Deactivated successfully. Jul 2 11:33:44.236239 kubelet[2066]: E0702 11:33:44.235427 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.236239 kubelet[2066]: W0702 11:33:44.235442 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.236239 kubelet[2066]: E0702 11:33:44.235577 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.237797 kubelet[2066]: E0702 11:33:44.236713 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.237797 kubelet[2066]: W0702 11:33:44.236734 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.237797 kubelet[2066]: E0702 11:33:44.236902 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.238644 kubelet[2066]: E0702 11:33:44.238617 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.238644 kubelet[2066]: W0702 11:33:44.238640 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.238838 kubelet[2066]: E0702 11:33:44.238813 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.239141 kubelet[2066]: E0702 11:33:44.239116 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.239141 kubelet[2066]: W0702 11:33:44.239136 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.239327 kubelet[2066]: E0702 11:33:44.239283 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.239748 kubelet[2066]: E0702 11:33:44.239723 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.239748 kubelet[2066]: W0702 11:33:44.239743 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.239920 kubelet[2066]: E0702 11:33:44.239886 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.240360 kubelet[2066]: E0702 11:33:44.240230 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.240360 kubelet[2066]: W0702 11:33:44.240248 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.240360 kubelet[2066]: E0702 11:33:44.240273 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.240820 kubelet[2066]: E0702 11:33:44.240779 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.240820 kubelet[2066]: W0702 11:33:44.240800 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.240989 kubelet[2066]: E0702 11:33:44.240914 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.241349 kubelet[2066]: E0702 11:33:44.241323 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.241349 kubelet[2066]: W0702 11:33:44.241344 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.241502 kubelet[2066]: E0702 11:33:44.241440 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.241872 kubelet[2066]: E0702 11:33:44.241847 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.241872 kubelet[2066]: W0702 11:33:44.241867 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.242112 kubelet[2066]: E0702 11:33:44.241967 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.242423 kubelet[2066]: E0702 11:33:44.242398 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.242423 kubelet[2066]: W0702 11:33:44.242418 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.242604 kubelet[2066]: E0702 11:33:44.242514 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.243640 env[1193]: time="2024-07-02T11:33:44.243565485Z" level=info msg="CreateContainer within sandbox \"15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74\"" Jul 2 11:33:44.244913 kubelet[2066]: E0702 11:33:44.244886 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.245057 kubelet[2066]: W0702 11:33:44.245029 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.245214 kubelet[2066]: E0702 11:33:44.245188 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.247726 kubelet[2066]: E0702 11:33:44.245618 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.247834 kubelet[2066]: W0702 11:33:44.247726 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.247915 env[1193]: time="2024-07-02T11:33:44.246077974Z" level=info msg="StartContainer for \"214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74\"" Jul 2 11:33:44.249969 kubelet[2066]: E0702 11:33:44.249935 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.250393 kubelet[2066]: E0702 11:33:44.250350 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.250393 kubelet[2066]: W0702 11:33:44.250383 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.250573 kubelet[2066]: E0702 11:33:44.250535 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.250966 kubelet[2066]: E0702 11:33:44.250928 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.250966 kubelet[2066]: W0702 11:33:44.250951 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.251316 kubelet[2066]: E0702 11:33:44.251279 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.251316 kubelet[2066]: W0702 11:33:44.251302 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.251482 kubelet[2066]: E0702 11:33:44.251323 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.251826 kubelet[2066]: E0702 11:33:44.251794 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:33:44.251826 kubelet[2066]: W0702 11:33:44.251816 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:33:44.252018 kubelet[2066]: E0702 11:33:44.251845 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.252018 kubelet[2066]: E0702 11:33:44.251886 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:33:44.298745 systemd[1]: Started cri-containerd-214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74.scope. Jul 2 11:33:44.334484 systemd[1]: run-containerd-runc-k8s.io-214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74-runc.l0cG34.mount: Deactivated successfully. Jul 2 11:33:44.365000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.369313 kernel: kauditd_printk_skb: 179 callbacks suppressed Jul 2 11:33:44.369452 kernel: audit: type=1400 audit(1719920024.365:1004): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.365000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fd95c116a18 items=0 ppid=2533 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:44.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346239353234636565613237653631653337616132383832326632 Jul 2 11:33:44.390851 kernel: audit: type=1300 audit(1719920024.365:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fd95c116a18 items=0 ppid=2533 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:44.390947 kernel: audit: type=1327 audit(1719920024.365:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346239353234636565613237653631653337616132383832326632 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.399778 kernel: audit: type=1400 audit(1719920024.372:1005): avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.405738 kernel: audit: type=1400 audit(1719920024.372:1005): avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.411773 kernel: audit: type=1400 audit(1719920024.372:1005): avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.419733 kernel: audit: type=1400 audit(1719920024.372:1005): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.425762 kernel: audit: type=1400 audit(1719920024.372:1005): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.431740 kernel: audit: type=1400 audit(1719920024.372:1005): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.437692 kernel: audit: type=1400 audit(1719920024.372:1005): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.372000 audit: BPF prog-id=133 op=LOAD Jul 2 11:33:44.372000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003c6128 items=0 ppid=2533 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:44.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346239353234636565613237653631653337616132383832326632 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit: BPF prog-id=134 op=LOAD Jul 2 11:33:44.373000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003c6178 items=0 ppid=2533 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:44.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346239353234636565613237653631653337616132383832326632 Jul 2 11:33:44.373000 audit: BPF prog-id=134 op=UNLOAD Jul 2 11:33:44.373000 audit: BPF prog-id=133 op=UNLOAD Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:44.373000 audit: BPF prog-id=135 op=LOAD Jul 2 11:33:44.373000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003c6208 items=0 ppid=2533 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:44.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346239353234636565613237653631653337616132383832326632 Jul 2 11:33:44.448028 env[1193]: time="2024-07-02T11:33:44.447824190Z" level=info msg="StartContainer for \"214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74\" returns successfully" Jul 2 11:33:44.461744 systemd[1]: cri-containerd-214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74.scope: Deactivated successfully. Jul 2 11:33:44.466000 audit: BPF prog-id=135 op=UNLOAD Jul 2 11:33:44.502517 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74-rootfs.mount: Deactivated successfully. Jul 2 11:33:44.525911 env[1193]: time="2024-07-02T11:33:44.525837451Z" level=info msg="shim disconnected" id=214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74 Jul 2 11:33:44.526311 env[1193]: time="2024-07-02T11:33:44.526266877Z" level=warning msg="cleaning up after shim disconnected" id=214b9524ceea27e61e37aa28822f26b502dd3de7f2a9708bbf95d68ee6a3da74 namespace=k8s.io Jul 2 11:33:44.526461 env[1193]: time="2024-07-02T11:33:44.526430631Z" level=info msg="cleaning up dead shim" Jul 2 11:33:44.540237 env[1193]: time="2024-07-02T11:33:44.540186315Z" level=warning msg="cleanup warnings time=\"2024-07-02T11:33:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2719 runtime=io.containerd.runc.v2\n" Jul 2 11:33:45.125408 env[1193]: time="2024-07-02T11:33:45.125338749Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 11:33:45.948713 kubelet[2066]: E0702 11:33:45.948604 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:47.959804 kubelet[2066]: E0702 11:33:47.959647 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:49.950566 kubelet[2066]: E0702 11:33:49.950477 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:51.948312 kubelet[2066]: E0702 11:33:51.948258 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:53.256016 env[1193]: time="2024-07-02T11:33:53.255896651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:53.258414 env[1193]: time="2024-07-02T11:33:53.258335430Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:53.260572 env[1193]: time="2024-07-02T11:33:53.260534418Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:53.265800 env[1193]: time="2024-07-02T11:33:53.265761509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:33:53.266631 env[1193]: time="2024-07-02T11:33:53.266582569Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 11:33:53.275284 env[1193]: time="2024-07-02T11:33:53.275223835Z" level=info msg="CreateContainer within sandbox \"15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 11:33:53.296880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount425118161.mount: Deactivated successfully. Jul 2 11:33:53.302724 env[1193]: time="2024-07-02T11:33:53.302633197Z" level=info msg="CreateContainer within sandbox \"15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b570ae21a945129b4a9367fda4aeb1c5dc0835039cb577ae654578bdb99b5ca2\"" Jul 2 11:33:53.303787 env[1193]: time="2024-07-02T11:33:53.303741206Z" level=info msg="StartContainer for \"b570ae21a945129b4a9367fda4aeb1c5dc0835039cb577ae654578bdb99b5ca2\"" Jul 2 11:33:53.366792 systemd[1]: Started cri-containerd-b570ae21a945129b4a9367fda4aeb1c5dc0835039cb577ae654578bdb99b5ca2.scope. Jul 2 11:33:53.459236 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 11:33:53.459516 kernel: audit: type=1400 audit(1719920033.451:1011): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.451000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.451000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f39f48c6608 items=0 ppid=2533 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:53.469010 kernel: audit: type=1300 audit(1719920033.451:1011): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f39f48c6608 items=0 ppid=2533 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:53.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235373061653231613934353132396234613933363766646134616562 Jul 2 11:33:53.477693 kernel: audit: type=1327 audit(1719920033.451:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235373061653231613934353132396234613933363766646134616562 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.488297 kernel: audit: type=1400 audit(1719920033.458:1012): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.488473 kernel: audit: type=1400 audit(1719920033.458:1012): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.488538 kernel: audit: type=1400 audit(1719920033.458:1012): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.505522 kernel: audit: type=1400 audit(1719920033.458:1012): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.505654 kernel: audit: type=1400 audit(1719920033.458:1012): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.512474 kernel: audit: type=1400 audit(1719920033.458:1012): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.533808 kernel: audit: type=1400 audit(1719920033.458:1012): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit: BPF prog-id=136 op=LOAD Jul 2 11:33:53.458000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00031c798 items=0 ppid=2533 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:53.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235373061653231613934353132396234613933363766646134616562 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit: BPF prog-id=137 op=LOAD Jul 2 11:33:53.458000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00031c7e8 items=0 ppid=2533 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:53.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235373061653231613934353132396234613933363766646134616562 Jul 2 11:33:53.458000 audit: BPF prog-id=137 op=UNLOAD Jul 2 11:33:53.458000 audit: BPF prog-id=136 op=UNLOAD Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:33:53.458000 audit: BPF prog-id=138 op=LOAD Jul 2 11:33:53.458000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00031c878 items=0 ppid=2533 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:53.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235373061653231613934353132396234613933363766646134616562 Jul 2 11:33:53.537043 env[1193]: time="2024-07-02T11:33:53.536980344Z" level=info msg="StartContainer for \"b570ae21a945129b4a9367fda4aeb1c5dc0835039cb577ae654578bdb99b5ca2\" returns successfully" Jul 2 11:33:53.950418 kubelet[2066]: E0702 11:33:53.950350 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:54.417303 env[1193]: time="2024-07-02T11:33:54.417009671Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 11:33:54.424069 systemd[1]: cri-containerd-b570ae21a945129b4a9367fda4aeb1c5dc0835039cb577ae654578bdb99b5ca2.scope: Deactivated successfully. Jul 2 11:33:54.425000 audit: BPF prog-id=138 op=UNLOAD Jul 2 11:33:54.459722 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b570ae21a945129b4a9367fda4aeb1c5dc0835039cb577ae654578bdb99b5ca2-rootfs.mount: Deactivated successfully. Jul 2 11:33:54.465968 env[1193]: time="2024-07-02T11:33:54.465849719Z" level=info msg="shim disconnected" id=b570ae21a945129b4a9367fda4aeb1c5dc0835039cb577ae654578bdb99b5ca2 Jul 2 11:33:54.465968 env[1193]: time="2024-07-02T11:33:54.465962115Z" level=warning msg="cleaning up after shim disconnected" id=b570ae21a945129b4a9367fda4aeb1c5dc0835039cb577ae654578bdb99b5ca2 namespace=k8s.io Jul 2 11:33:54.466313 env[1193]: time="2024-07-02T11:33:54.465982857Z" level=info msg="cleaning up dead shim" Jul 2 11:33:54.478939 env[1193]: time="2024-07-02T11:33:54.478846809Z" level=warning msg="cleanup warnings time=\"2024-07-02T11:33:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2783 runtime=io.containerd.runc.v2\n" Jul 2 11:33:54.490285 kubelet[2066]: I0702 11:33:54.489694 2066 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 11:33:54.527522 kubelet[2066]: I0702 11:33:54.527460 2066 topology_manager.go:215] "Topology Admit Handler" podUID="9504903b-5e89-4455-a59e-c61af7465c25" podNamespace="kube-system" podName="coredns-76f75df574-q6x44" Jul 2 11:33:54.535820 systemd[1]: Created slice kubepods-burstable-pod9504903b_5e89_4455_a59e_c61af7465c25.slice. Jul 2 11:33:54.539882 kubelet[2066]: I0702 11:33:54.539821 2066 topology_manager.go:215] "Topology Admit Handler" podUID="a1577fc7-4f30-4b2a-9821-0946e39523a3" podNamespace="kube-system" podName="coredns-76f75df574-qvgm2" Jul 2 11:33:54.546994 kubelet[2066]: I0702 11:33:54.546953 2066 topology_manager.go:215] "Topology Admit Handler" podUID="c74f35aa-6ca8-4536-a437-e52341fb086d" podNamespace="calico-system" podName="calico-kube-controllers-78d7bf57c8-kcqv5" Jul 2 11:33:54.551631 systemd[1]: Created slice kubepods-burstable-poda1577fc7_4f30_4b2a_9821_0946e39523a3.slice. Jul 2 11:33:54.561810 systemd[1]: Created slice kubepods-besteffort-podc74f35aa_6ca8_4536_a437_e52341fb086d.slice. Jul 2 11:33:54.633732 kubelet[2066]: I0702 11:33:54.633566 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c74f35aa-6ca8-4536-a437-e52341fb086d-tigera-ca-bundle\") pod \"calico-kube-controllers-78d7bf57c8-kcqv5\" (UID: \"c74f35aa-6ca8-4536-a437-e52341fb086d\") " pod="calico-system/calico-kube-controllers-78d7bf57c8-kcqv5" Jul 2 11:33:54.633986 kubelet[2066]: I0702 11:33:54.633771 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9504903b-5e89-4455-a59e-c61af7465c25-config-volume\") pod \"coredns-76f75df574-q6x44\" (UID: \"9504903b-5e89-4455-a59e-c61af7465c25\") " pod="kube-system/coredns-76f75df574-q6x44" Jul 2 11:33:54.633986 kubelet[2066]: I0702 11:33:54.633892 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9jc9x\" (UniqueName: \"kubernetes.io/projected/9504903b-5e89-4455-a59e-c61af7465c25-kube-api-access-9jc9x\") pod \"coredns-76f75df574-q6x44\" (UID: \"9504903b-5e89-4455-a59e-c61af7465c25\") " pod="kube-system/coredns-76f75df574-q6x44" Jul 2 11:33:54.634141 kubelet[2066]: I0702 11:33:54.634010 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a1577fc7-4f30-4b2a-9821-0946e39523a3-config-volume\") pod \"coredns-76f75df574-qvgm2\" (UID: \"a1577fc7-4f30-4b2a-9821-0946e39523a3\") " pod="kube-system/coredns-76f75df574-qvgm2" Jul 2 11:33:54.634141 kubelet[2066]: I0702 11:33:54.634112 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gk7fj\" (UniqueName: \"kubernetes.io/projected/a1577fc7-4f30-4b2a-9821-0946e39523a3-kube-api-access-gk7fj\") pod \"coredns-76f75df574-qvgm2\" (UID: \"a1577fc7-4f30-4b2a-9821-0946e39523a3\") " pod="kube-system/coredns-76f75df574-qvgm2" Jul 2 11:33:54.634265 kubelet[2066]: I0702 11:33:54.634220 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t44hk\" (UniqueName: \"kubernetes.io/projected/c74f35aa-6ca8-4536-a437-e52341fb086d-kube-api-access-t44hk\") pod \"calico-kube-controllers-78d7bf57c8-kcqv5\" (UID: \"c74f35aa-6ca8-4536-a437-e52341fb086d\") " pod="calico-system/calico-kube-controllers-78d7bf57c8-kcqv5" Jul 2 11:33:54.847012 env[1193]: time="2024-07-02T11:33:54.845761817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q6x44,Uid:9504903b-5e89-4455-a59e-c61af7465c25,Namespace:kube-system,Attempt:0,}" Jul 2 11:33:54.862044 env[1193]: time="2024-07-02T11:33:54.861986388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-qvgm2,Uid:a1577fc7-4f30-4b2a-9821-0946e39523a3,Namespace:kube-system,Attempt:0,}" Jul 2 11:33:54.868167 env[1193]: time="2024-07-02T11:33:54.868122440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78d7bf57c8-kcqv5,Uid:c74f35aa-6ca8-4536-a437-e52341fb086d,Namespace:calico-system,Attempt:0,}" Jul 2 11:33:55.021097 env[1193]: time="2024-07-02T11:33:55.020948516Z" level=error msg="Failed to destroy network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.021607 env[1193]: time="2024-07-02T11:33:55.021547348Z" level=error msg="encountered an error cleaning up failed sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.021866 env[1193]: time="2024-07-02T11:33:55.021663529Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-qvgm2,Uid:a1577fc7-4f30-4b2a-9821-0946e39523a3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.022310 kubelet[2066]: E0702 11:33:55.022259 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.022876 kubelet[2066]: E0702 11:33:55.022365 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-qvgm2" Jul 2 11:33:55.022876 kubelet[2066]: E0702 11:33:55.022420 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-qvgm2" Jul 2 11:33:55.022876 kubelet[2066]: E0702 11:33:55.022519 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-qvgm2_kube-system(a1577fc7-4f30-4b2a-9821-0946e39523a3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-qvgm2_kube-system(a1577fc7-4f30-4b2a-9821-0946e39523a3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-qvgm2" podUID="a1577fc7-4f30-4b2a-9821-0946e39523a3" Jul 2 11:33:55.029612 env[1193]: time="2024-07-02T11:33:55.029542739Z" level=error msg="Failed to destroy network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.030247 env[1193]: time="2024-07-02T11:33:55.030177017Z" level=error msg="encountered an error cleaning up failed sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.030339 env[1193]: time="2024-07-02T11:33:55.030266253Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q6x44,Uid:9504903b-5e89-4455-a59e-c61af7465c25,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.030571 kubelet[2066]: E0702 11:33:55.030538 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.030692 kubelet[2066]: E0702 11:33:55.030598 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-q6x44" Jul 2 11:33:55.030692 kubelet[2066]: E0702 11:33:55.030627 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-q6x44" Jul 2 11:33:55.030885 kubelet[2066]: E0702 11:33:55.030732 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-q6x44_kube-system(9504903b-5e89-4455-a59e-c61af7465c25)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-q6x44_kube-system(9504903b-5e89-4455-a59e-c61af7465c25)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q6x44" podUID="9504903b-5e89-4455-a59e-c61af7465c25" Jul 2 11:33:55.055016 env[1193]: time="2024-07-02T11:33:55.054919434Z" level=error msg="Failed to destroy network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.055899 env[1193]: time="2024-07-02T11:33:55.055816913Z" level=error msg="encountered an error cleaning up failed sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.056157 env[1193]: time="2024-07-02T11:33:55.056085939Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78d7bf57c8-kcqv5,Uid:c74f35aa-6ca8-4536-a437-e52341fb086d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.056819 kubelet[2066]: E0702 11:33:55.056687 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.056819 kubelet[2066]: E0702 11:33:55.056766 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78d7bf57c8-kcqv5" Jul 2 11:33:55.057541 kubelet[2066]: E0702 11:33:55.057057 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78d7bf57c8-kcqv5" Jul 2 11:33:55.057541 kubelet[2066]: E0702 11:33:55.057175 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-78d7bf57c8-kcqv5_calico-system(c74f35aa-6ca8-4536-a437-e52341fb086d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-78d7bf57c8-kcqv5_calico-system(c74f35aa-6ca8-4536-a437-e52341fb086d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78d7bf57c8-kcqv5" podUID="c74f35aa-6ca8-4536-a437-e52341fb086d" Jul 2 11:33:55.155008 env[1193]: time="2024-07-02T11:33:55.152079453Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 11:33:55.158532 kubelet[2066]: I0702 11:33:55.158492 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:33:55.163466 env[1193]: time="2024-07-02T11:33:55.163423593Z" level=info msg="StopPodSandbox for \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\"" Jul 2 11:33:55.165013 kubelet[2066]: I0702 11:33:55.164987 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:33:55.173085 env[1193]: time="2024-07-02T11:33:55.173014789Z" level=info msg="StopPodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\"" Jul 2 11:33:55.175833 kubelet[2066]: I0702 11:33:55.175726 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:33:55.178231 env[1193]: time="2024-07-02T11:33:55.178179087Z" level=info msg="StopPodSandbox for \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\"" Jul 2 11:33:55.250630 env[1193]: time="2024-07-02T11:33:55.250519638Z" level=error msg="StopPodSandbox for \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\" failed" error="failed to destroy network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.251130 kubelet[2066]: E0702 11:33:55.251094 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:33:55.251332 kubelet[2066]: E0702 11:33:55.251305 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50"} Jul 2 11:33:55.251431 kubelet[2066]: E0702 11:33:55.251396 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c74f35aa-6ca8-4536-a437-e52341fb086d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:33:55.251601 kubelet[2066]: E0702 11:33:55.251461 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c74f35aa-6ca8-4536-a437-e52341fb086d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78d7bf57c8-kcqv5" podUID="c74f35aa-6ca8-4536-a437-e52341fb086d" Jul 2 11:33:55.261829 env[1193]: time="2024-07-02T11:33:55.261760755Z" level=error msg="StopPodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\" failed" error="failed to destroy network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.262324 kubelet[2066]: E0702 11:33:55.262269 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:33:55.262324 kubelet[2066]: E0702 11:33:55.262324 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642"} Jul 2 11:33:55.262503 kubelet[2066]: E0702 11:33:55.262395 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a1577fc7-4f30-4b2a-9821-0946e39523a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:33:55.262503 kubelet[2066]: E0702 11:33:55.262446 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a1577fc7-4f30-4b2a-9821-0946e39523a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-qvgm2" podUID="a1577fc7-4f30-4b2a-9821-0946e39523a3" Jul 2 11:33:55.264008 env[1193]: time="2024-07-02T11:33:55.263961151Z" level=error msg="StopPodSandbox for \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\" failed" error="failed to destroy network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:55.264610 kubelet[2066]: E0702 11:33:55.264370 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:33:55.264610 kubelet[2066]: E0702 11:33:55.264421 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b"} Jul 2 11:33:55.264610 kubelet[2066]: E0702 11:33:55.264500 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9504903b-5e89-4455-a59e-c61af7465c25\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:33:55.264610 kubelet[2066]: E0702 11:33:55.264566 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9504903b-5e89-4455-a59e-c61af7465c25\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q6x44" podUID="9504903b-5e89-4455-a59e-c61af7465c25" Jul 2 11:33:55.461285 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b-shm.mount: Deactivated successfully. Jul 2 11:33:55.962366 systemd[1]: Created slice kubepods-besteffort-pod1908f106_f0a8_4f1e_9abc_20ce87803b86.slice. Jul 2 11:33:55.968682 env[1193]: time="2024-07-02T11:33:55.967976263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q75b8,Uid:1908f106-f0a8-4f1e-9abc-20ce87803b86,Namespace:calico-system,Attempt:0,}" Jul 2 11:33:56.087826 env[1193]: time="2024-07-02T11:33:56.087717528Z" level=error msg="Failed to destroy network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:56.091070 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762-shm.mount: Deactivated successfully. Jul 2 11:33:56.092797 env[1193]: time="2024-07-02T11:33:56.092744138Z" level=error msg="encountered an error cleaning up failed sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:56.092974 env[1193]: time="2024-07-02T11:33:56.092867243Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q75b8,Uid:1908f106-f0a8-4f1e-9abc-20ce87803b86,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:56.093464 kubelet[2066]: E0702 11:33:56.093409 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:56.093967 kubelet[2066]: E0702 11:33:56.093535 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-q75b8" Jul 2 11:33:56.093967 kubelet[2066]: E0702 11:33:56.093589 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-q75b8" Jul 2 11:33:56.093967 kubelet[2066]: E0702 11:33:56.093767 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-q75b8_calico-system(1908f106-f0a8-4f1e-9abc-20ce87803b86)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-q75b8_calico-system(1908f106-f0a8-4f1e-9abc-20ce87803b86)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:56.180714 kubelet[2066]: I0702 11:33:56.180267 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:33:56.183447 env[1193]: time="2024-07-02T11:33:56.183370743Z" level=info msg="StopPodSandbox for \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\"" Jul 2 11:33:56.228018 env[1193]: time="2024-07-02T11:33:56.227142042Z" level=error msg="StopPodSandbox for \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\" failed" error="failed to destroy network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:33:56.228217 kubelet[2066]: E0702 11:33:56.228033 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:33:56.228217 kubelet[2066]: E0702 11:33:56.228107 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762"} Jul 2 11:33:56.228217 kubelet[2066]: E0702 11:33:56.228163 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1908f106-f0a8-4f1e-9abc-20ce87803b86\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:33:56.228217 kubelet[2066]: E0702 11:33:56.228215 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1908f106-f0a8-4f1e-9abc-20ce87803b86\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-q75b8" podUID="1908f106-f0a8-4f1e-9abc-20ce87803b86" Jul 2 11:33:58.728469 kubelet[2066]: I0702 11:33:58.727876 2066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 11:33:58.830749 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 11:33:58.831116 kernel: audit: type=1325 audit(1719920038.822:1018): table=filter:95 family=2 entries=15 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:58.822000 audit[3009]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:58.832403 kernel: audit: type=1300 audit(1719920038.822:1018): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff40cc4d90 a2=0 a3=7fff40cc4d7c items=0 ppid=2239 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:58.822000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff40cc4d90 a2=0 a3=7fff40cc4d7c items=0 ppid=2239 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:58.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:58.827000 audit[3009]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:58.849096 kernel: audit: type=1327 audit(1719920038.822:1018): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:58.849212 kernel: audit: type=1325 audit(1719920038.827:1019): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:33:58.827000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff40cc4d90 a2=0 a3=7fff40cc4d7c items=0 ppid=2239 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:58.857249 kernel: audit: type=1300 audit(1719920038.827:1019): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff40cc4d90 a2=0 a3=7fff40cc4d7c items=0 ppid=2239 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:33:58.857701 kernel: audit: type=1327 audit(1719920038.827:1019): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:33:58.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:06.326864 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount481097226.mount: Deactivated successfully. Jul 2 11:34:06.366800 env[1193]: time="2024-07-02T11:34:06.366570555Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:06.374822 env[1193]: time="2024-07-02T11:34:06.374783348Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:06.377305 env[1193]: time="2024-07-02T11:34:06.377270073Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:06.379059 env[1193]: time="2024-07-02T11:34:06.379022955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:06.380075 env[1193]: time="2024-07-02T11:34:06.380016442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 11:34:06.434569 env[1193]: time="2024-07-02T11:34:06.432841139Z" level=info msg="CreateContainer within sandbox \"15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 11:34:06.457897 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1166247651.mount: Deactivated successfully. Jul 2 11:34:06.463517 env[1193]: time="2024-07-02T11:34:06.463440829Z" level=info msg="CreateContainer within sandbox \"15a5ef4393c904708d5d4c24b8511bf291615bd35a265bc0a2fd00295593aacb\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39\"" Jul 2 11:34:06.464864 env[1193]: time="2024-07-02T11:34:06.464825141Z" level=info msg="StartContainer for \"f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39\"" Jul 2 11:34:06.506068 systemd[1]: Started cri-containerd-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39.scope. Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.568951 kernel: audit: type=1400 audit(1719920046.554:1020): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.569120 kernel: audit: type=1300 audit(1719920046.554:1020): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f959c90db18 items=0 ppid=2533 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:06.569204 kernel: audit: type=1327 audit(1719920046.554:1020): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323864366366333632363234353337383934616565653434333634 Jul 2 11:34:06.554000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f959c90db18 items=0 ppid=2533 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:06.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323864366366333632363234353337383934616565653434333634 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.582065 kernel: audit: type=1400 audit(1719920046.554:1021): avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.582158 kernel: audit: type=1400 audit(1719920046.554:1021): avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.598793 kernel: audit: type=1400 audit(1719920046.554:1021): avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.598907 kernel: audit: type=1400 audit(1719920046.554:1021): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.604249 kernel: audit: type=1400 audit(1719920046.554:1021): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.609511 kernel: audit: type=1400 audit(1719920046.554:1021): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit: BPF prog-id=139 op=LOAD Jul 2 11:34:06.554000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000290228 items=0 ppid=2533 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:06.615909 kernel: audit: type=1400 audit(1719920046.554:1021): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323864366366333632363234353337383934616565653434333634 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.575000 audit: BPF prog-id=140 op=LOAD Jul 2 11:34:06.575000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c000290278 items=0 ppid=2533 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:06.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323864366366333632363234353337383934616565653434333634 Jul 2 11:34:06.591000 audit: BPF prog-id=140 op=UNLOAD Jul 2 11:34:06.591000 audit: BPF prog-id=139 op=UNLOAD Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:06.591000 audit: BPF prog-id=141 op=LOAD Jul 2 11:34:06.591000 audit[3023]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000290308 items=0 ppid=2533 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:06.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323864366366333632363234353337383934616565653434333634 Jul 2 11:34:06.642102 env[1193]: time="2024-07-02T11:34:06.642036400Z" level=info msg="StartContainer for \"f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39\" returns successfully" Jul 2 11:34:06.852329 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 11:34:06.852555 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 11:34:06.948790 env[1193]: time="2024-07-02T11:34:06.948717030Z" level=info msg="StopPodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\"" Jul 2 11:34:07.036375 env[1193]: time="2024-07-02T11:34:07.036242565Z" level=error msg="StopPodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\" failed" error="failed to destroy network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:34:07.055114 kubelet[2066]: E0702 11:34:07.054948 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:34:07.056292 kubelet[2066]: E0702 11:34:07.055158 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642"} Jul 2 11:34:07.056292 kubelet[2066]: E0702 11:34:07.055254 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a1577fc7-4f30-4b2a-9821-0946e39523a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:34:07.066085 kubelet[2066]: E0702 11:34:07.066032 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a1577fc7-4f30-4b2a-9821-0946e39523a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-qvgm2" podUID="a1577fc7-4f30-4b2a-9821-0946e39523a3" Jul 2 11:34:07.289061 kubelet[2066]: I0702 11:34:07.288210 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pn44c" podStartSLOduration=3.462146421 podStartE2EDuration="29.281458744s" podCreationTimestamp="2024-07-02 11:33:38 +0000 UTC" firstStartedPulling="2024-07-02 11:33:40.561395906 +0000 UTC m=+22.875786146" lastFinishedPulling="2024-07-02 11:34:06.380708225 +0000 UTC m=+48.695098469" observedRunningTime="2024-07-02 11:34:07.277925659 +0000 UTC m=+49.592315913" watchObservedRunningTime="2024-07-02 11:34:07.281458744 +0000 UTC m=+49.595848988" Jul 2 11:34:08.283192 systemd[1]: run-containerd-runc-k8s.io-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39-runc.eXd5Sk.mount: Deactivated successfully. Jul 2 11:34:08.741000 audit[3160]: AVC avc: denied { write } for pid=3160 comm="tee" name="fd" dev="proc" ino=29242 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:34:08.743000 audit[3165]: AVC avc: denied { write } for pid=3165 comm="tee" name="fd" dev="proc" ino=29245 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:34:08.743000 audit[3165]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9a0b9a03 a2=241 a3=1b6 items=1 ppid=3146 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:08.743000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 11:34:08.743000 audit: PATH item=0 name="/dev/fd/63" inode=29718 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:34:08.743000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:34:08.741000 audit[3160]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd66d649f2 a2=241 a3=1b6 items=1 ppid=3141 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:08.741000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 11:34:08.741000 audit: PATH item=0 name="/dev/fd/63" inode=29715 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:34:08.741000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:34:08.757000 audit[3167]: AVC avc: denied { write } for pid=3167 comm="tee" name="fd" dev="proc" ino=29253 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:34:08.757000 audit[3167]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe67000a04 a2=241 a3=1b6 items=1 ppid=3134 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:08.757000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 11:34:08.757000 audit: PATH item=0 name="/dev/fd/63" inode=29719 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:34:08.757000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:34:08.797000 audit[3188]: AVC avc: denied { write } for pid=3188 comm="tee" name="fd" dev="proc" ino=29273 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:34:08.802000 audit[3200]: AVC avc: denied { write } for pid=3200 comm="tee" name="fd" dev="proc" ino=29276 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:34:08.797000 audit[3188]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6bf5fa02 a2=241 a3=1b6 items=1 ppid=3135 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:08.797000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 11:34:08.806000 audit[3190]: AVC avc: denied { write } for pid=3190 comm="tee" name="fd" dev="proc" ino=29278 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:34:08.797000 audit: PATH item=0 name="/dev/fd/63" inode=29255 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:34:08.797000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:34:08.806000 audit[3190]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb49e5a02 a2=241 a3=1b6 items=1 ppid=3149 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:08.806000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 11:34:08.806000 audit: PATH item=0 name="/dev/fd/63" inode=29256 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:34:08.806000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:34:08.813000 audit[3198]: AVC avc: denied { write } for pid=3198 comm="tee" name="fd" dev="proc" ino=29282 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:34:08.802000 audit[3200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe133f9a02 a2=241 a3=1b6 items=1 ppid=3157 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:08.802000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 11:34:08.802000 audit: PATH item=0 name="/dev/fd/63" inode=29262 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:34:08.802000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:34:08.813000 audit[3198]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9260d9f3 a2=241 a3=1b6 items=1 ppid=3138 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:08.813000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 11:34:08.813000 audit: PATH item=0 name="/dev/fd/63" inode=29259 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:34:08.813000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:34:08.948995 env[1193]: time="2024-07-02T11:34:08.948898159Z" level=info msg="StopPodSandbox for \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\"" Jul 2 11:34:08.950254 env[1193]: time="2024-07-02T11:34:08.950168134Z" level=info msg="StopPodSandbox for \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\"" Jul 2 11:34:09.398382 systemd[1]: run-containerd-runc-k8s.io-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39-runc.NIF2Xo.mount: Deactivated successfully. Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.103 [INFO][3241] k8s.go 608: Cleaning up netns ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.104 [INFO][3241] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" iface="eth0" netns="/var/run/netns/cni-d139d9f8-5859-9c43-671a-aa16bb08e02b" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.104 [INFO][3241] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" iface="eth0" netns="/var/run/netns/cni-d139d9f8-5859-9c43-671a-aa16bb08e02b" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.105 [INFO][3241] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" iface="eth0" netns="/var/run/netns/cni-d139d9f8-5859-9c43-671a-aa16bb08e02b" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.106 [INFO][3241] k8s.go 615: Releasing IP address(es) ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.106 [INFO][3241] utils.go 188: Calico CNI releasing IP address ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.404 [INFO][3254] ipam_plugin.go 411: Releasing address using handleID ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.406 [INFO][3254] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.406 [INFO][3254] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.435 [WARNING][3254] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.435 [INFO][3254] ipam_plugin.go 439: Releasing address using workloadID ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.449 [INFO][3254] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:09.465712 env[1193]: 2024-07-02 11:34:09.454 [INFO][3241] k8s.go 621: Teardown processing complete. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:09.465712 env[1193]: time="2024-07-02T11:34:09.460621325Z" level=info msg="TearDown network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\" successfully" Jul 2 11:34:09.465712 env[1193]: time="2024-07-02T11:34:09.460740017Z" level=info msg="StopPodSandbox for \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\" returns successfully" Jul 2 11:34:09.460742 systemd[1]: run-netns-cni\x2dd139d9f8\x2d5859\x2d9c43\x2d671a\x2daa16bb08e02b.mount: Deactivated successfully. Jul 2 11:34:09.469528 env[1193]: time="2024-07-02T11:34:09.468061510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q6x44,Uid:9504903b-5e89-4455-a59e-c61af7465c25,Namespace:kube-system,Attempt:1,}" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.116 [INFO][3242] k8s.go 608: Cleaning up netns ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.117 [INFO][3242] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" iface="eth0" netns="/var/run/netns/cni-4c304abd-9c6d-5130-fb86-dd5736858d50" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.117 [INFO][3242] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" iface="eth0" netns="/var/run/netns/cni-4c304abd-9c6d-5130-fb86-dd5736858d50" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.117 [INFO][3242] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" iface="eth0" netns="/var/run/netns/cni-4c304abd-9c6d-5130-fb86-dd5736858d50" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.117 [INFO][3242] k8s.go 615: Releasing IP address(es) ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.118 [INFO][3242] utils.go 188: Calico CNI releasing IP address ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.408 [INFO][3255] ipam_plugin.go 411: Releasing address using handleID ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.409 [INFO][3255] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.449 [INFO][3255] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.491 [WARNING][3255] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.492 [INFO][3255] ipam_plugin.go 439: Releasing address using workloadID ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.502 [INFO][3255] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:09.509715 env[1193]: 2024-07-02 11:34:09.505 [INFO][3242] k8s.go 621: Teardown processing complete. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:09.509715 env[1193]: time="2024-07-02T11:34:09.507948457Z" level=info msg="TearDown network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\" successfully" Jul 2 11:34:09.509715 env[1193]: time="2024-07-02T11:34:09.508000577Z" level=info msg="StopPodSandbox for \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\" returns successfully" Jul 2 11:34:09.513903 env[1193]: time="2024-07-02T11:34:09.511810743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78d7bf57c8-kcqv5,Uid:c74f35aa-6ca8-4536-a437-e52341fb086d,Namespace:calico-system,Attempt:1,}" Jul 2 11:34:09.888425 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 11:34:09.888738 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali91d50f7dc8f: link becomes ready Jul 2 11:34:09.895900 systemd-networkd[1032]: cali91d50f7dc8f: Link UP Jul 2 11:34:09.896254 systemd-networkd[1032]: cali91d50f7dc8f: Gained carrier Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.589 [INFO][3288] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.642 [INFO][3288] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0 coredns-76f75df574- kube-system 9504903b-5e89-4455-a59e-c61af7465c25 738 0 2024-07-02 11:33:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-z4l15.gb1.brightbox.com coredns-76f75df574-q6x44 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali91d50f7dc8f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Namespace="kube-system" Pod="coredns-76f75df574-q6x44" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.642 [INFO][3288] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Namespace="kube-system" Pod="coredns-76f75df574-q6x44" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.739 [INFO][3316] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" HandleID="k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.753 [INFO][3316] ipam_plugin.go 264: Auto assigning IP ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" HandleID="k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312100), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-z4l15.gb1.brightbox.com", "pod":"coredns-76f75df574-q6x44", "timestamp":"2024-07-02 11:34:09.738975287 +0000 UTC"}, Hostname:"srv-z4l15.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.753 [INFO][3316] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.753 [INFO][3316] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.754 [INFO][3316] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-z4l15.gb1.brightbox.com' Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.758 [INFO][3316] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.788 [INFO][3316] ipam.go 372: Looking up existing affinities for host host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.806 [INFO][3316] ipam.go 489: Trying affinity for 192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.811 [INFO][3316] ipam.go 155: Attempting to load block cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.818 [INFO][3316] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.818 [INFO][3316] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.128/26 handle="k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.822 [INFO][3316] ipam.go 1685: Creating new handle: k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.830 [INFO][3316] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.128/26 handle="k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.839 [INFO][3316] ipam.go 1216: Successfully claimed IPs: [192.168.85.129/26] block=192.168.85.128/26 handle="k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.839 [INFO][3316] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.129/26] handle="k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.839 [INFO][3316] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:09.930820 env[1193]: 2024-07-02 11:34:09.839 [INFO][3316] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.85.129/26] IPv6=[] ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" HandleID="k8s-pod-network.c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.932641 env[1193]: 2024-07-02 11:34:09.841 [INFO][3288] k8s.go 386: Populated endpoint ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Namespace="kube-system" Pod="coredns-76f75df574-q6x44" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9504903b-5e89-4455-a59e-c61af7465c25", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"", Pod:"coredns-76f75df574-q6x44", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali91d50f7dc8f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:09.932641 env[1193]: 2024-07-02 11:34:09.842 [INFO][3288] k8s.go 387: Calico CNI using IPs: [192.168.85.129/32] ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Namespace="kube-system" Pod="coredns-76f75df574-q6x44" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.932641 env[1193]: 2024-07-02 11:34:09.842 [INFO][3288] dataplane_linux.go 68: Setting the host side veth name to cali91d50f7dc8f ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Namespace="kube-system" Pod="coredns-76f75df574-q6x44" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.932641 env[1193]: 2024-07-02 11:34:09.884 [INFO][3288] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Namespace="kube-system" Pod="coredns-76f75df574-q6x44" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.932641 env[1193]: 2024-07-02 11:34:09.888 [INFO][3288] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Namespace="kube-system" Pod="coredns-76f75df574-q6x44" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9504903b-5e89-4455-a59e-c61af7465c25", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb", Pod:"coredns-76f75df574-q6x44", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali91d50f7dc8f", MAC:"6a:32:d9:68:ed:da", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:09.932641 env[1193]: 2024-07-02 11:34:09.926 [INFO][3288] k8s.go 500: Wrote updated endpoint to datastore ContainerID="c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb" Namespace="kube-system" Pod="coredns-76f75df574-q6x44" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:09.992791 env[1193]: time="2024-07-02T11:34:09.989971573Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:34:09.992791 env[1193]: time="2024-07-02T11:34:09.990066820Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:34:09.992791 env[1193]: time="2024-07-02T11:34:09.990085237Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:34:09.992791 env[1193]: time="2024-07-02T11:34:09.990584832Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb pid=3365 runtime=io.containerd.runc.v2 Jul 2 11:34:10.019038 systemd-networkd[1032]: cali9f63a80b157: Link UP Jul 2 11:34:10.034644 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9f63a80b157: link becomes ready Jul 2 11:34:10.034134 systemd-networkd[1032]: cali9f63a80b157: Gained carrier Jul 2 11:34:10.079928 systemd[1]: Started cri-containerd-c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb.scope. Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.627 [INFO][3295] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.681 [INFO][3295] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0 calico-kube-controllers-78d7bf57c8- calico-system c74f35aa-6ca8-4536-a437-e52341fb086d 739 0 2024-07-02 11:33:38 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:78d7bf57c8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-z4l15.gb1.brightbox.com calico-kube-controllers-78d7bf57c8-kcqv5 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali9f63a80b157 [] []}} ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Namespace="calico-system" Pod="calico-kube-controllers-78d7bf57c8-kcqv5" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.681 [INFO][3295] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Namespace="calico-system" Pod="calico-kube-controllers-78d7bf57c8-kcqv5" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.782 [INFO][3322] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" HandleID="k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.799 [INFO][3322] ipam_plugin.go 264: Auto assigning IP ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" HandleID="k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004ebde0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-z4l15.gb1.brightbox.com", "pod":"calico-kube-controllers-78d7bf57c8-kcqv5", "timestamp":"2024-07-02 11:34:09.777386612 +0000 UTC"}, Hostname:"srv-z4l15.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.799 [INFO][3322] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.840 [INFO][3322] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.840 [INFO][3322] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-z4l15.gb1.brightbox.com' Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.845 [INFO][3322] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.874 [INFO][3322] ipam.go 372: Looking up existing affinities for host host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.935 [INFO][3322] ipam.go 489: Trying affinity for 192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.942 [INFO][3322] ipam.go 155: Attempting to load block cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.961 [INFO][3322] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.961 [INFO][3322] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.128/26 handle="k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.967 [INFO][3322] ipam.go 1685: Creating new handle: k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618 Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:09.985 [INFO][3322] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.128/26 handle="k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:10.005 [INFO][3322] ipam.go 1216: Successfully claimed IPs: [192.168.85.130/26] block=192.168.85.128/26 handle="k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:10.005 [INFO][3322] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.130/26] handle="k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:10.005 [INFO][3322] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:10.088707 env[1193]: 2024-07-02 11:34:10.005 [INFO][3322] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.85.130/26] IPv6=[] ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" HandleID="k8s-pod-network.c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:10.090306 env[1193]: 2024-07-02 11:34:10.008 [INFO][3295] k8s.go 386: Populated endpoint ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Namespace="calico-system" Pod="calico-kube-controllers-78d7bf57c8-kcqv5" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0", GenerateName:"calico-kube-controllers-78d7bf57c8-", Namespace:"calico-system", SelfLink:"", UID:"c74f35aa-6ca8-4536-a437-e52341fb086d", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78d7bf57c8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-78d7bf57c8-kcqv5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9f63a80b157", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:10.090306 env[1193]: 2024-07-02 11:34:10.008 [INFO][3295] k8s.go 387: Calico CNI using IPs: [192.168.85.130/32] ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Namespace="calico-system" Pod="calico-kube-controllers-78d7bf57c8-kcqv5" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:10.090306 env[1193]: 2024-07-02 11:34:10.008 [INFO][3295] dataplane_linux.go 68: Setting the host side veth name to cali9f63a80b157 ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Namespace="calico-system" Pod="calico-kube-controllers-78d7bf57c8-kcqv5" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:10.090306 env[1193]: 2024-07-02 11:34:10.040 [INFO][3295] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Namespace="calico-system" Pod="calico-kube-controllers-78d7bf57c8-kcqv5" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:10.090306 env[1193]: 2024-07-02 11:34:10.041 [INFO][3295] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Namespace="calico-system" Pod="calico-kube-controllers-78d7bf57c8-kcqv5" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0", GenerateName:"calico-kube-controllers-78d7bf57c8-", Namespace:"calico-system", SelfLink:"", UID:"c74f35aa-6ca8-4536-a437-e52341fb086d", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78d7bf57c8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618", Pod:"calico-kube-controllers-78d7bf57c8-kcqv5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9f63a80b157", MAC:"1e:25:23:78:1b:81", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:10.090306 env[1193]: 2024-07-02 11:34:10.077 [INFO][3295] k8s.go 500: Wrote updated endpoint to datastore ContainerID="c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618" Namespace="calico-system" Pod="calico-kube-controllers-78d7bf57c8-kcqv5" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.113000 audit: BPF prog-id=142 op=LOAD Jul 2 11:34:10.114000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.114000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3365 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616234316332373731666536353630623231626331373739636133 Jul 2 11:34:10.114000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.114000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3365 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616234316332373731666536353630623231626331373739636133 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit: BPF prog-id=143 op=LOAD Jul 2 11:34:10.115000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001a95f0 items=0 ppid=3365 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616234316332373731666536353630623231626331373739636133 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit: BPF prog-id=144 op=LOAD Jul 2 11:34:10.115000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001a9638 items=0 ppid=3365 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616234316332373731666536353630623231626331373739636133 Jul 2 11:34:10.115000 audit: BPF prog-id=144 op=UNLOAD Jul 2 11:34:10.115000 audit: BPF prog-id=143 op=UNLOAD Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.115000 audit: BPF prog-id=145 op=LOAD Jul 2 11:34:10.115000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001a9a48 items=0 ppid=3365 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616234316332373731666536353630623231626331373739636133 Jul 2 11:34:10.134732 env[1193]: time="2024-07-02T11:34:10.133310742Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:34:10.134732 env[1193]: time="2024-07-02T11:34:10.133419218Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:34:10.134732 env[1193]: time="2024-07-02T11:34:10.133473030Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:34:10.134732 env[1193]: time="2024-07-02T11:34:10.134039017Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618 pid=3415 runtime=io.containerd.runc.v2 Jul 2 11:34:10.180883 systemd[1]: Started cri-containerd-c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618.scope. Jul 2 11:34:10.202238 env[1193]: time="2024-07-02T11:34:10.202137914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q6x44,Uid:9504903b-5e89-4455-a59e-c61af7465c25,Namespace:kube-system,Attempt:1,} returns sandbox id \"c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb\"" Jul 2 11:34:10.209549 env[1193]: time="2024-07-02T11:34:10.209462128Z" level=info msg="CreateContainer within sandbox \"c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 11:34:10.232758 env[1193]: time="2024-07-02T11:34:10.232678057Z" level=info msg="CreateContainer within sandbox \"c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"be668b0fc4af7dfacd150c4d8514a086a7ccf87f04c790289dcf586565ff9c12\"" Jul 2 11:34:10.234090 env[1193]: time="2024-07-02T11:34:10.234054359Z" level=info msg="StartContainer for \"be668b0fc4af7dfacd150c4d8514a086a7ccf87f04c790289dcf586565ff9c12\"" Jul 2 11:34:10.300653 systemd[1]: Started cri-containerd-be668b0fc4af7dfacd150c4d8514a086a7ccf87f04c790289dcf586565ff9c12.scope. Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.357000 audit: BPF prog-id=146 op=LOAD Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3365 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363638623066633461663764666163643135306334643835313461 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3365 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363638623066633461663764666163643135306334643835313461 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.358000 audit: BPF prog-id=147 op=LOAD Jul 2 11:34:10.358000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000331f30 items=0 ppid=3365 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363638623066633461663764666163643135306334643835313461 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.362000 audit: BPF prog-id=148 op=LOAD Jul 2 11:34:10.362000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000331f78 items=0 ppid=3365 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363638623066633461663764666163643135306334643835313461 Jul 2 11:34:10.363000 audit: BPF prog-id=148 op=UNLOAD Jul 2 11:34:10.363000 audit: BPF prog-id=147 op=UNLOAD Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.363000 audit: BPF prog-id=149 op=LOAD Jul 2 11:34:10.363000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000380388 items=0 ppid=3365 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363638623066633461663764666163643135306334643835313461 Jul 2 11:34:10.388459 systemd[1]: run-netns-cni\x2d4c304abd\x2d9c6d\x2d5130\x2dfb86\x2ddd5736858d50.mount: Deactivated successfully. Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.402000 audit: BPF prog-id=150 op=LOAD Jul 2 11:34:10.406000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.406000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3415 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386137386663336465643033613430333230633334383238326638 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3415 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386137386663336465643033613430333230633334383238326638 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.407000 audit: BPF prog-id=151 op=LOAD Jul 2 11:34:10.407000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000091050 items=0 ppid=3415 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386137386663336465643033613430333230633334383238326638 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit: BPF prog-id=152 op=LOAD Jul 2 11:34:10.412000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000091098 items=0 ppid=3415 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386137386663336465643033613430333230633334383238326638 Jul 2 11:34:10.412000 audit: BPF prog-id=152 op=UNLOAD Jul 2 11:34:10.412000 audit: BPF prog-id=151 op=UNLOAD Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.412000 audit: BPF prog-id=153 op=LOAD Jul 2 11:34:10.412000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000914a8 items=0 ppid=3415 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386137386663336465643033613430333230633334383238326638 Jul 2 11:34:10.418630 env[1193]: time="2024-07-02T11:34:10.409321289Z" level=info msg="StartContainer for \"be668b0fc4af7dfacd150c4d8514a086a7ccf87f04c790289dcf586565ff9c12\" returns successfully" Jul 2 11:34:10.486066 env[1193]: time="2024-07-02T11:34:10.485997437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78d7bf57c8-kcqv5,Uid:c74f35aa-6ca8-4536-a437-e52341fb086d,Namespace:calico-system,Attempt:1,} returns sandbox id \"c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618\"" Jul 2 11:34:10.490420 env[1193]: time="2024-07-02T11:34:10.490375231Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 11:34:10.694097 systemd[1]: run-containerd-runc-k8s.io-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39-runc.rXgnDh.mount: Deactivated successfully. Jul 2 11:34:10.748434 systemd-networkd[1032]: vxlan.calico: Link UP Jul 2 11:34:10.748447 systemd-networkd[1032]: vxlan.calico: Gained carrier Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit: BPF prog-id=154 op=LOAD Jul 2 11:34:10.905000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff61e0d050 a2=70 a3=7f6c2b3ce000 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.905000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.905000 audit: BPF prog-id=154 op=UNLOAD Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.905000 audit: BPF prog-id=155 op=LOAD Jul 2 11:34:10.905000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff61e0d050 a2=70 a3=6f items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.905000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.906000 audit: BPF prog-id=155 op=UNLOAD Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff61e0d000 a2=70 a3=7fff61e0d050 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit: BPF prog-id=156 op=LOAD Jul 2 11:34:10.906000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff61e0cfe0 a2=70 a3=7fff61e0d050 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.906000 audit: BPF prog-id=156 op=UNLOAD Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff61e0d0c0 a2=70 a3=0 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff61e0d0b0 a2=70 a3=0 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.906000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.906000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff61e0d020 a2=70 a3=0 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.908000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.908000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff61e0d0f0 a2=70 a3=fe00 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.908000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.908000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.908000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff61e0d0f0 a2=70 a3=fe00 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.908000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.909000 audit: BPF prog-id=157 op=LOAD Jul 2 11:34:10.909000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff61e0d010 a2=70 a3=0 items=0 ppid=3158 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:34:10.926000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.926000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc268c2ed0 a2=70 a3=fff80800 items=0 ppid=3158 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.926000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 11:34:10.928000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:10.928000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc268c2da0 a2=70 a3=3 items=0 ppid=3158 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:10.928000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 11:34:10.948694 env[1193]: time="2024-07-02T11:34:10.948474350Z" level=info msg="StopPodSandbox for \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\"" Jul 2 11:34:10.973000 audit: BPF prog-id=157 op=UNLOAD Jul 2 11:34:11.085967 systemd-networkd[1032]: cali9f63a80b157: Gained IPv6LL Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.115 [INFO][3582] k8s.go 608: Cleaning up netns ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.115 [INFO][3582] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" iface="eth0" netns="/var/run/netns/cni-940f3576-1c86-0f2d-86fd-e8f0ca2bf02a" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.115 [INFO][3582] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" iface="eth0" netns="/var/run/netns/cni-940f3576-1c86-0f2d-86fd-e8f0ca2bf02a" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.116 [INFO][3582] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" iface="eth0" netns="/var/run/netns/cni-940f3576-1c86-0f2d-86fd-e8f0ca2bf02a" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.116 [INFO][3582] k8s.go 615: Releasing IP address(es) ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.116 [INFO][3582] utils.go 188: Calico CNI releasing IP address ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.206 [INFO][3591] ipam_plugin.go 411: Releasing address using handleID ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.206 [INFO][3591] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.207 [INFO][3591] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.228 [WARNING][3591] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.228 [INFO][3591] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.234 [INFO][3591] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:11.237896 env[1193]: 2024-07-02 11:34:11.236 [INFO][3582] k8s.go 621: Teardown processing complete. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:11.242977 systemd[1]: run-netns-cni\x2d940f3576\x2d1c86\x2d0f2d\x2d86fd\x2de8f0ca2bf02a.mount: Deactivated successfully. Jul 2 11:34:11.244067 env[1193]: time="2024-07-02T11:34:11.244006879Z" level=info msg="TearDown network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\" successfully" Jul 2 11:34:11.244659 env[1193]: time="2024-07-02T11:34:11.244623074Z" level=info msg="StopPodSandbox for \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\" returns successfully" Jul 2 11:34:11.246011 env[1193]: time="2024-07-02T11:34:11.245969800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q75b8,Uid:1908f106-f0a8-4f1e-9abc-20ce87803b86,Namespace:calico-system,Attempt:1,}" Jul 2 11:34:11.286000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:11.286000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00168a400 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:11.286000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:11.286000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:11.286000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b025a0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:11.286000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:11.328636 kubelet[2066]: I0702 11:34:11.328310 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-q6x44" podStartSLOduration=42.328153775 podStartE2EDuration="42.328153775s" podCreationTimestamp="2024-07-02 11:33:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:34:11.303509547 +0000 UTC m=+53.617899815" watchObservedRunningTime="2024-07-02 11:34:11.328153775 +0000 UTC m=+53.642544022" Jul 2 11:34:11.410000 audit[3619]: NETFILTER_CFG table=filter:97 family=2 entries=14 op=nft_register_rule pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:11.410000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe35cb9d80 a2=0 a3=7ffe35cb9d6c items=0 ppid=2239 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:11.414000 audit[3619]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:11.414000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe35cb9d80 a2=0 a3=0 items=0 ppid=2239 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:11.430000 audit[3623]: NETFILTER_CFG table=filter:99 family=2 entries=11 op=nft_register_rule pid=3623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:11.430000 audit[3623]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf730a510 a2=0 a3=7ffdf730a4fc items=0 ppid=2239 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:11.432000 audit[3623]: NETFILTER_CFG table=nat:100 family=2 entries=35 op=nft_register_chain pid=3623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:11.432000 audit[3623]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdf730a510 a2=0 a3=7ffdf730a4fc items=0 ppid=2239 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:11.550682 systemd-networkd[1032]: caliad3ecaffbd1: Link UP Jul 2 11:34:11.561773 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliad3ecaffbd1: link becomes ready Jul 2 11:34:11.562326 systemd-networkd[1032]: caliad3ecaffbd1: Gained carrier Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.354 [INFO][3600] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0 csi-node-driver- calico-system 1908f106-f0a8-4f1e-9abc-20ce87803b86 757 0 2024-07-02 11:33:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s srv-z4l15.gb1.brightbox.com csi-node-driver-q75b8 eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliad3ecaffbd1 [] []}} ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Namespace="calico-system" Pod="csi-node-driver-q75b8" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.354 [INFO][3600] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Namespace="calico-system" Pod="csi-node-driver-q75b8" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.434 [INFO][3613] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" HandleID="k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.471 [INFO][3613] ipam_plugin.go 264: Auto assigning IP ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" HandleID="k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314560), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-z4l15.gb1.brightbox.com", "pod":"csi-node-driver-q75b8", "timestamp":"2024-07-02 11:34:11.434735897 +0000 UTC"}, Hostname:"srv-z4l15.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.471 [INFO][3613] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.472 [INFO][3613] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.472 [INFO][3613] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-z4l15.gb1.brightbox.com' Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.489 [INFO][3613] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.503 [INFO][3613] ipam.go 372: Looking up existing affinities for host host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.512 [INFO][3613] ipam.go 489: Trying affinity for 192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.514 [INFO][3613] ipam.go 155: Attempting to load block cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.517 [INFO][3613] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.517 [INFO][3613] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.128/26 handle="k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.520 [INFO][3613] ipam.go 1685: Creating new handle: k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934 Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.526 [INFO][3613] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.128/26 handle="k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.533 [INFO][3613] ipam.go 1216: Successfully claimed IPs: [192.168.85.131/26] block=192.168.85.128/26 handle="k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.533 [INFO][3613] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.131/26] handle="k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.534 [INFO][3613] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:11.593404 env[1193]: 2024-07-02 11:34:11.534 [INFO][3613] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.85.131/26] IPv6=[] ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" HandleID="k8s-pod-network.a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.595870 env[1193]: 2024-07-02 11:34:11.536 [INFO][3600] k8s.go 386: Populated endpoint ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Namespace="calico-system" Pod="csi-node-driver-q75b8" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1908f106-f0a8-4f1e-9abc-20ce87803b86", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-q75b8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.85.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliad3ecaffbd1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:11.595870 env[1193]: 2024-07-02 11:34:11.536 [INFO][3600] k8s.go 387: Calico CNI using IPs: [192.168.85.131/32] ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Namespace="calico-system" Pod="csi-node-driver-q75b8" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.595870 env[1193]: 2024-07-02 11:34:11.536 [INFO][3600] dataplane_linux.go 68: Setting the host side veth name to caliad3ecaffbd1 ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Namespace="calico-system" Pod="csi-node-driver-q75b8" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.595870 env[1193]: 2024-07-02 11:34:11.554 [INFO][3600] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Namespace="calico-system" Pod="csi-node-driver-q75b8" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.595870 env[1193]: 2024-07-02 11:34:11.554 [INFO][3600] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Namespace="calico-system" Pod="csi-node-driver-q75b8" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1908f106-f0a8-4f1e-9abc-20ce87803b86", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934", Pod:"csi-node-driver-q75b8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.85.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliad3ecaffbd1", MAC:"ea:76:b5:42:71:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:11.595870 env[1193]: 2024-07-02 11:34:11.591 [INFO][3600] k8s.go 500: Wrote updated endpoint to datastore ContainerID="a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934" Namespace="calico-system" Pod="csi-node-driver-q75b8" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:11.630023 env[1193]: time="2024-07-02T11:34:11.626580213Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:34:11.630023 env[1193]: time="2024-07-02T11:34:11.626650480Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:34:11.630023 env[1193]: time="2024-07-02T11:34:11.626682947Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:34:11.630656 env[1193]: time="2024-07-02T11:34:11.630560322Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934 pid=3660 runtime=io.containerd.runc.v2 Jul 2 11:34:11.659011 kernel: kauditd_printk_skb: 334 callbacks suppressed Jul 2 11:34:11.659192 kernel: audit: type=1325 audit(1719920051.642:1109): table=nat:101 family=2 entries=15 op=nft_register_chain pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.659279 kernel: audit: type=1300 audit(1719920051.642:1109): arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc3db08990 a2=0 a3=7ffc3db0897c items=0 ppid=3158 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.642000 audit[3641]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.642000 audit[3641]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc3db08990 a2=0 a3=7ffc3db0897c items=0 ppid=3158 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.642000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:11.666400 kernel: audit: type=1327 audit(1719920051.642:1109): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:11.685738 kernel: audit: type=1325 audit(1719920051.669:1110): table=mangle:102 family=2 entries=16 op=nft_register_chain pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.685879 kernel: audit: type=1325 audit(1719920051.674:1111): table=raw:103 family=2 entries=19 op=nft_register_chain pid=3642 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.669000 audit[3640]: NETFILTER_CFG table=mangle:102 family=2 entries=16 op=nft_register_chain pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.674000 audit[3642]: NETFILTER_CFG table=raw:103 family=2 entries=19 op=nft_register_chain pid=3642 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.696911 kernel: audit: type=1300 audit(1719920051.674:1111): arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7fff39f07d00 a2=0 a3=7fff39f07cec items=0 ppid=3158 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.674000 audit[3642]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7fff39f07d00 a2=0 a3=7fff39f07cec items=0 ppid=3158 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.703485 systemd[1]: run-containerd-runc-k8s.io-a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934-runc.3JgOZ7.mount: Deactivated successfully. Jul 2 11:34:11.674000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:11.713762 kernel: audit: type=1327 audit(1719920051.674:1111): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:11.676000 audit[3673]: NETFILTER_CFG table=filter:104 family=2 entries=99 op=nft_register_chain pid=3673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.725265 kernel: audit: type=1325 audit(1719920051.676:1112): table=filter:104 family=2 entries=99 op=nft_register_chain pid=3673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.724800 systemd[1]: Started cri-containerd-a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934.scope. Jul 2 11:34:11.676000 audit[3673]: SYSCALL arch=c000003e syscall=46 success=yes exit=53840 a0=3 a1=7ffda0cfbe70 a2=0 a3=7ffda0cfbe5c items=0 ppid=3158 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.747714 kernel: audit: type=1300 audit(1719920051.676:1112): arch=c000003e syscall=46 success=yes exit=53840 a0=3 a1=7ffda0cfbe70 a2=0 a3=7ffda0cfbe5c items=0 ppid=3158 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.676000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:11.752697 kernel: audit: type=1327 audit(1719920051.676:1112): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:11.669000 audit[3640]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffffaefcfc0 a2=0 a3=7ffffaefcfac items=0 ppid=3158 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.755000 audit: BPF prog-id=158 op=LOAD Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303961383639656561666530313537396639316330373634353839 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303961383639656561666530313537396639316330373634353839 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit: BPF prog-id=159 op=LOAD Jul 2 11:34:11.756000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002ab450 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303961383639656561666530313537396639316330373634353839 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit: BPF prog-id=160 op=LOAD Jul 2 11:34:11.756000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002ab498 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303961383639656561666530313537396639316330373634353839 Jul 2 11:34:11.756000 audit: BPF prog-id=160 op=UNLOAD Jul 2 11:34:11.756000 audit: BPF prog-id=159 op=UNLOAD Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:11.756000 audit: BPF prog-id=161 op=LOAD Jul 2 11:34:11.756000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002ab8a8 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303961383639656561666530313537396639316330373634353839 Jul 2 11:34:11.787082 env[1193]: time="2024-07-02T11:34:11.787002329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q75b8,Uid:1908f106-f0a8-4f1e-9abc-20ce87803b86,Namespace:calico-system,Attempt:1,} returns sandbox id \"a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934\"" Jul 2 11:34:11.790575 systemd-networkd[1032]: cali91d50f7dc8f: Gained IPv6LL Jul 2 11:34:11.910000 audit[3705]: NETFILTER_CFG table=filter:105 family=2 entries=44 op=nft_register_chain pid=3705 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:11.910000 audit[3705]: SYSCALL arch=c000003e syscall=46 success=yes exit=22680 a0=3 a1=7ffe11a6c400 a2=0 a3=7ffe11a6c3ec items=0 ppid=3158 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:11.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:11.919085 systemd-networkd[1032]: vxlan.calico: Gained IPv6LL Jul 2 11:34:12.714000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:12.714000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00950fec0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:34:12.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:34:12.719000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:12.719000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0053e1160 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:34:12.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:34:12.719000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:12.719000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0097c0450 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:34:12.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:34:12.766000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:12.766000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0095f1710 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:34:12.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:34:12.786000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:12.786000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0095f1950 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:34:12.786000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:34:12.787000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:12.787000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0053e1f00 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:34:12.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:34:13.518551 systemd-networkd[1032]: caliad3ecaffbd1: Gained IPv6LL Jul 2 11:34:14.288236 env[1193]: time="2024-07-02T11:34:14.288142139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:14.293286 env[1193]: time="2024-07-02T11:34:14.293225254Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:14.296967 env[1193]: time="2024-07-02T11:34:14.296920265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:14.302205 env[1193]: time="2024-07-02T11:34:14.302156575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:14.302660 env[1193]: time="2024-07-02T11:34:14.302603521Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 11:34:14.307092 env[1193]: time="2024-07-02T11:34:14.307008278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 11:34:14.347578 env[1193]: time="2024-07-02T11:34:14.347491384Z" level=info msg="CreateContainer within sandbox \"c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 11:34:14.367882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2575222824.mount: Deactivated successfully. Jul 2 11:34:14.374520 env[1193]: time="2024-07-02T11:34:14.374466629Z" level=info msg="CreateContainer within sandbox \"c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a\"" Jul 2 11:34:14.375332 env[1193]: time="2024-07-02T11:34:14.375252680Z" level=info msg="StartContainer for \"17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a\"" Jul 2 11:34:14.451890 systemd[1]: Started cri-containerd-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a.scope. Jul 2 11:34:14.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.590000 audit: BPF prog-id=162 op=LOAD Jul 2 11:34:14.591000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.591000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3415 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:14.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137666631373964353931373933373032323963323231346438396135 Jul 2 11:34:14.591000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.591000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3415 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:14.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137666631373964353931373933373032323963323231346438396135 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.592000 audit: BPF prog-id=163 op=LOAD Jul 2 11:34:14.592000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000255d0 items=0 ppid=3415 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137666631373964353931373933373032323963323231346438396135 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.594000 audit: BPF prog-id=164 op=LOAD Jul 2 11:34:14.594000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025618 items=0 ppid=3415 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:14.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137666631373964353931373933373032323963323231346438396135 Jul 2 11:34:14.596000 audit: BPF prog-id=164 op=UNLOAD Jul 2 11:34:14.596000 audit: BPF prog-id=163 op=UNLOAD Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:14.596000 audit: BPF prog-id=165 op=LOAD Jul 2 11:34:14.596000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025a28 items=0 ppid=3415 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:14.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137666631373964353931373933373032323963323231346438396135 Jul 2 11:34:14.692610 env[1193]: time="2024-07-02T11:34:14.692546379Z" level=info msg="StartContainer for \"17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a\" returns successfully" Jul 2 11:34:15.347315 systemd[1]: run-containerd-runc-k8s.io-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a-runc.FP12NU.mount: Deactivated successfully. Jul 2 11:34:15.467910 kubelet[2066]: I0702 11:34:15.467836 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-78d7bf57c8-kcqv5" podStartSLOduration=33.625510228 podStartE2EDuration="37.440126524s" podCreationTimestamp="2024-07-02 11:33:38 +0000 UTC" firstStartedPulling="2024-07-02 11:34:10.489550944 +0000 UTC m=+52.803941178" lastFinishedPulling="2024-07-02 11:34:14.304167227 +0000 UTC m=+56.618557474" observedRunningTime="2024-07-02 11:34:15.30716081 +0000 UTC m=+57.621551066" watchObservedRunningTime="2024-07-02 11:34:15.440126524 +0000 UTC m=+57.754516771" Jul 2 11:34:16.545563 env[1193]: time="2024-07-02T11:34:16.545389836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:16.548215 env[1193]: time="2024-07-02T11:34:16.548152181Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:16.550997 env[1193]: time="2024-07-02T11:34:16.550904726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:16.553249 env[1193]: time="2024-07-02T11:34:16.553197667Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:16.554157 env[1193]: time="2024-07-02T11:34:16.554112783Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 11:34:16.561089 env[1193]: time="2024-07-02T11:34:16.561032233Z" level=info msg="CreateContainer within sandbox \"a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 11:34:16.584886 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2288896712.mount: Deactivated successfully. Jul 2 11:34:16.589495 env[1193]: time="2024-07-02T11:34:16.589436203Z" level=info msg="CreateContainer within sandbox \"a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2f0da438807bb0107218cb0a6c612c8c0cf6055fee02c042864f9980c7f1d128\"" Jul 2 11:34:16.593543 env[1193]: time="2024-07-02T11:34:16.593503601Z" level=info msg="StartContainer for \"2f0da438807bb0107218cb0a6c612c8c0cf6055fee02c042864f9980c7f1d128\"" Jul 2 11:34:16.641492 systemd[1]: Started cri-containerd-2f0da438807bb0107218cb0a6c612c8c0cf6055fee02c042864f9980c7f1d128.scope. Jul 2 11:34:16.654618 systemd[1]: run-containerd-runc-k8s.io-2f0da438807bb0107218cb0a6c612c8c0cf6055fee02c042864f9980c7f1d128-runc.GMmJI9.mount: Deactivated successfully. Jul 2 11:34:16.706285 kernel: kauditd_printk_skb: 137 callbacks suppressed Jul 2 11:34:16.706547 kernel: audit: type=1400 audit(1719920056.698:1156): avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f93f35fb2f8 items=0 ppid=3660 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:16.715730 kernel: audit: type=1300 audit(1719920056.698:1156): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f93f35fb2f8 items=0 ppid=3660 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:16.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306461343338383037626230313037323138636230613663363132 Jul 2 11:34:16.724763 kernel: audit: type=1327 audit(1719920056.698:1156): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306461343338383037626230313037323138636230613663363132 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.731739 kernel: audit: type=1400 audit(1719920056.698:1157): avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.742548 kernel: audit: type=1400 audit(1719920056.698:1157): avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.742634 kernel: audit: type=1400 audit(1719920056.698:1157): avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.752744 kernel: audit: type=1400 audit(1719920056.698:1157): avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.764741 kernel: audit: type=1400 audit(1719920056.698:1157): avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.782386 kernel: audit: type=1400 audit(1719920056.698:1157): avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.782488 kernel: audit: type=1400 audit(1719920056.698:1157): avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.698000 audit: BPF prog-id=166 op=LOAD Jul 2 11:34:16.698000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000025f58 items=0 ppid=3660 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:16.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306461343338383037626230313037323138636230613663363132 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.715000 audit: BPF prog-id=167 op=LOAD Jul 2 11:34:16.715000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000025fa8 items=0 ppid=3660 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:16.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306461343338383037626230313037323138636230613663363132 Jul 2 11:34:16.734000 audit: BPF prog-id=167 op=UNLOAD Jul 2 11:34:16.734000 audit: BPF prog-id=166 op=UNLOAD Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:16.734000 audit: BPF prog-id=168 op=LOAD Jul 2 11:34:16.734000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002e4038 items=0 ppid=3660 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:16.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306461343338383037626230313037323138636230613663363132 Jul 2 11:34:16.808215 env[1193]: time="2024-07-02T11:34:16.805043047Z" level=info msg="StartContainer for \"2f0da438807bb0107218cb0a6c612c8c0cf6055fee02c042864f9980c7f1d128\" returns successfully" Jul 2 11:34:16.813878 env[1193]: time="2024-07-02T11:34:16.813796261Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 11:34:18.025697 env[1193]: time="2024-07-02T11:34:18.025580291Z" level=info msg="StopPodSandbox for \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\"" Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.109 [WARNING][3820] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1908f106-f0a8-4f1e-9abc-20ce87803b86", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934", Pod:"csi-node-driver-q75b8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.85.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliad3ecaffbd1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.109 [INFO][3820] k8s.go 608: Cleaning up netns ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.109 [INFO][3820] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" iface="eth0" netns="" Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.109 [INFO][3820] k8s.go 615: Releasing IP address(es) ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.109 [INFO][3820] utils.go 188: Calico CNI releasing IP address ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.157 [INFO][3826] ipam_plugin.go 411: Releasing address using handleID ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.157 [INFO][3826] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.157 [INFO][3826] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.169 [WARNING][3826] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.169 [INFO][3826] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.170 [INFO][3826] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:18.175138 env[1193]: 2024-07-02 11:34:18.173 [INFO][3820] k8s.go 621: Teardown processing complete. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:18.176353 env[1193]: time="2024-07-02T11:34:18.175188064Z" level=info msg="TearDown network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\" successfully" Jul 2 11:34:18.176353 env[1193]: time="2024-07-02T11:34:18.175235573Z" level=info msg="StopPodSandbox for \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\" returns successfully" Jul 2 11:34:18.176641 env[1193]: time="2024-07-02T11:34:18.176363907Z" level=info msg="RemovePodSandbox for \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\"" Jul 2 11:34:18.176897 env[1193]: time="2024-07-02T11:34:18.176714560Z" level=info msg="Forcibly stopping sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\"" Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.228 [WARNING][3845] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1908f106-f0a8-4f1e-9abc-20ce87803b86", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934", Pod:"csi-node-driver-q75b8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.85.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliad3ecaffbd1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.229 [INFO][3845] k8s.go 608: Cleaning up netns ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.229 [INFO][3845] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" iface="eth0" netns="" Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.229 [INFO][3845] k8s.go 615: Releasing IP address(es) ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.229 [INFO][3845] utils.go 188: Calico CNI releasing IP address ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.263 [INFO][3851] ipam_plugin.go 411: Releasing address using handleID ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.263 [INFO][3851] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.264 [INFO][3851] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.272 [WARNING][3851] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.273 [INFO][3851] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" HandleID="k8s-pod-network.bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Workload="srv--z4l15.gb1.brightbox.com-k8s-csi--node--driver--q75b8-eth0" Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.274 [INFO][3851] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:18.283600 env[1193]: 2024-07-02 11:34:18.276 [INFO][3845] k8s.go 621: Teardown processing complete. ContainerID="bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762" Jul 2 11:34:18.283600 env[1193]: time="2024-07-02T11:34:18.282119216Z" level=info msg="TearDown network for sandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\" successfully" Jul 2 11:34:18.286550 env[1193]: time="2024-07-02T11:34:18.286509891Z" level=info msg="RemovePodSandbox \"bfc925b0f5a5553f42ae64d254dbe94158c5cba1bd9ef8ccb4fc0c914018c762\" returns successfully" Jul 2 11:34:18.288149 env[1193]: time="2024-07-02T11:34:18.288112929Z" level=info msg="StopPodSandbox for \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\"" Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.355 [WARNING][3870] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0", GenerateName:"calico-kube-controllers-78d7bf57c8-", Namespace:"calico-system", SelfLink:"", UID:"c74f35aa-6ca8-4536-a437-e52341fb086d", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78d7bf57c8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618", Pod:"calico-kube-controllers-78d7bf57c8-kcqv5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9f63a80b157", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.355 [INFO][3870] k8s.go 608: Cleaning up netns ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.355 [INFO][3870] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" iface="eth0" netns="" Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.355 [INFO][3870] k8s.go 615: Releasing IP address(es) ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.355 [INFO][3870] utils.go 188: Calico CNI releasing IP address ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.389 [INFO][3876] ipam_plugin.go 411: Releasing address using handleID ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.389 [INFO][3876] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.390 [INFO][3876] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.400 [WARNING][3876] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.400 [INFO][3876] ipam_plugin.go 439: Releasing address using workloadID ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.402 [INFO][3876] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:18.406201 env[1193]: 2024-07-02 11:34:18.404 [INFO][3870] k8s.go 621: Teardown processing complete. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:18.408078 env[1193]: time="2024-07-02T11:34:18.406231721Z" level=info msg="TearDown network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\" successfully" Jul 2 11:34:18.408078 env[1193]: time="2024-07-02T11:34:18.406281453Z" level=info msg="StopPodSandbox for \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\" returns successfully" Jul 2 11:34:18.408078 env[1193]: time="2024-07-02T11:34:18.406996636Z" level=info msg="RemovePodSandbox for \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\"" Jul 2 11:34:18.408078 env[1193]: time="2024-07-02T11:34:18.407038744Z" level=info msg="Forcibly stopping sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\"" Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.537 [WARNING][3895] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0", GenerateName:"calico-kube-controllers-78d7bf57c8-", Namespace:"calico-system", SelfLink:"", UID:"c74f35aa-6ca8-4536-a437-e52341fb086d", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78d7bf57c8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"c68a78fc3ded03a40320c348282f83cb2d8714b38aebba2aae407fdc5b766618", Pod:"calico-kube-controllers-78d7bf57c8-kcqv5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9f63a80b157", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.538 [INFO][3895] k8s.go 608: Cleaning up netns ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.538 [INFO][3895] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" iface="eth0" netns="" Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.538 [INFO][3895] k8s.go 615: Releasing IP address(es) ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.538 [INFO][3895] utils.go 188: Calico CNI releasing IP address ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.583 [INFO][3902] ipam_plugin.go 411: Releasing address using handleID ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.583 [INFO][3902] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.583 [INFO][3902] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.594 [WARNING][3902] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.594 [INFO][3902] ipam_plugin.go 439: Releasing address using workloadID ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" HandleID="k8s-pod-network.4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--kube--controllers--78d7bf57c8--kcqv5-eth0" Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.599 [INFO][3902] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:18.613026 env[1193]: 2024-07-02 11:34:18.603 [INFO][3895] k8s.go 621: Teardown processing complete. ContainerID="4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50" Jul 2 11:34:18.614232 env[1193]: time="2024-07-02T11:34:18.614169747Z" level=info msg="TearDown network for sandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\" successfully" Jul 2 11:34:18.618037 env[1193]: time="2024-07-02T11:34:18.617994757Z" level=info msg="RemovePodSandbox \"4628316656ab7553bf6bfd7cd99b709498539d0d112b2c2a9b2fe1b87b0b3a50\" returns successfully" Jul 2 11:34:18.619224 env[1193]: time="2024-07-02T11:34:18.619188803Z" level=info msg="StopPodSandbox for \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\"" Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.709 [WARNING][3921] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9504903b-5e89-4455-a59e-c61af7465c25", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb", Pod:"coredns-76f75df574-q6x44", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali91d50f7dc8f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.709 [INFO][3921] k8s.go 608: Cleaning up netns ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.709 [INFO][3921] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" iface="eth0" netns="" Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.709 [INFO][3921] k8s.go 615: Releasing IP address(es) ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.709 [INFO][3921] utils.go 188: Calico CNI releasing IP address ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.751 [INFO][3927] ipam_plugin.go 411: Releasing address using handleID ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.751 [INFO][3927] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.752 [INFO][3927] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.760 [WARNING][3927] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.760 [INFO][3927] ipam_plugin.go 439: Releasing address using workloadID ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.763 [INFO][3927] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:18.766702 env[1193]: 2024-07-02 11:34:18.765 [INFO][3921] k8s.go 621: Teardown processing complete. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:18.768358 env[1193]: time="2024-07-02T11:34:18.766754601Z" level=info msg="TearDown network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\" successfully" Jul 2 11:34:18.768358 env[1193]: time="2024-07-02T11:34:18.766820367Z" level=info msg="StopPodSandbox for \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\" returns successfully" Jul 2 11:34:18.768358 env[1193]: time="2024-07-02T11:34:18.768007666Z" level=info msg="RemovePodSandbox for \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\"" Jul 2 11:34:18.768358 env[1193]: time="2024-07-02T11:34:18.768048161Z" level=info msg="Forcibly stopping sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\"" Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.846 [WARNING][3947] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9504903b-5e89-4455-a59e-c61af7465c25", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"c5ab41c2771fe6560b21bc1779ca34f20f2e2eb043a41035fdb9378adff01fcb", Pod:"coredns-76f75df574-q6x44", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali91d50f7dc8f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.846 [INFO][3947] k8s.go 608: Cleaning up netns ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.846 [INFO][3947] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" iface="eth0" netns="" Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.846 [INFO][3947] k8s.go 615: Releasing IP address(es) ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.846 [INFO][3947] utils.go 188: Calico CNI releasing IP address ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.887 [INFO][3954] ipam_plugin.go 411: Releasing address using handleID ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.887 [INFO][3954] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.887 [INFO][3954] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.897 [WARNING][3954] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.897 [INFO][3954] ipam_plugin.go 439: Releasing address using workloadID ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" HandleID="k8s-pod-network.92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--q6x44-eth0" Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.899 [INFO][3954] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:18.905386 env[1193]: 2024-07-02 11:34:18.901 [INFO][3947] k8s.go 621: Teardown processing complete. ContainerID="92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b" Jul 2 11:34:18.906801 env[1193]: time="2024-07-02T11:34:18.906729130Z" level=info msg="TearDown network for sandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\" successfully" Jul 2 11:34:18.910746 env[1193]: time="2024-07-02T11:34:18.910706792Z" level=info msg="RemovePodSandbox \"92e22c0b5a788f0a09bb2a47d8a1528331ba3b4911c436d2168a20a966a2948b\" returns successfully" Jul 2 11:34:19.114963 env[1193]: time="2024-07-02T11:34:19.114861329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:19.117853 env[1193]: time="2024-07-02T11:34:19.117806821Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:19.120617 env[1193]: time="2024-07-02T11:34:19.120528334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:19.123528 env[1193]: time="2024-07-02T11:34:19.123475961Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:19.124576 env[1193]: time="2024-07-02T11:34:19.124521154Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 11:34:19.131058 env[1193]: time="2024-07-02T11:34:19.131012233Z" level=info msg="CreateContainer within sandbox \"a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 11:34:19.161259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1128276652.mount: Deactivated successfully. Jul 2 11:34:19.172159 env[1193]: time="2024-07-02T11:34:19.172016516Z" level=info msg="CreateContainer within sandbox \"a409a869eeafe01579f91c0764589d38491225c36a610d655d01cae53a66a934\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"acf19bfe1d9b9849cb10abe33bd05f66eefcf344f505ad0033f39b8627500b06\"" Jul 2 11:34:19.174945 env[1193]: time="2024-07-02T11:34:19.173320971Z" level=info msg="StartContainer for \"acf19bfe1d9b9849cb10abe33bd05f66eefcf344f505ad0033f39b8627500b06\"" Jul 2 11:34:19.235938 systemd[1]: Started cri-containerd-acf19bfe1d9b9849cb10abe33bd05f66eefcf344f505ad0033f39b8627500b06.scope. Jul 2 11:34:19.267000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.267000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f35306163e8 items=0 ppid=3660 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:19.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163663139626665316439623938343963623130616265333362643035 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.268000 audit: BPF prog-id=169 op=LOAD Jul 2 11:34:19.268000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a8c8 items=0 ppid=3660 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:19.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163663139626665316439623938343963623130616265333362643035 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.270000 audit: BPF prog-id=170 op=LOAD Jul 2 11:34:19.270000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028a918 items=0 ppid=3660 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:19.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163663139626665316439623938343963623130616265333362643035 Jul 2 11:34:19.271000 audit: BPF prog-id=170 op=UNLOAD Jul 2 11:34:19.272000 audit: BPF prog-id=169 op=UNLOAD Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:19.272000 audit: BPF prog-id=171 op=LOAD Jul 2 11:34:19.272000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028a9a8 items=0 ppid=3660 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:19.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163663139626665316439623938343963623130616265333362643035 Jul 2 11:34:19.301557 env[1193]: time="2024-07-02T11:34:19.301505431Z" level=info msg="StartContainer for \"acf19bfe1d9b9849cb10abe33bd05f66eefcf344f505ad0033f39b8627500b06\" returns successfully" Jul 2 11:34:19.336786 kubelet[2066]: I0702 11:34:19.336712 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-q75b8" podStartSLOduration=34.002572435 podStartE2EDuration="41.336542985s" podCreationTimestamp="2024-07-02 11:33:38 +0000 UTC" firstStartedPulling="2024-07-02 11:34:11.792013401 +0000 UTC m=+54.106403641" lastFinishedPulling="2024-07-02 11:34:19.125983947 +0000 UTC m=+61.440374191" observedRunningTime="2024-07-02 11:34:19.334884055 +0000 UTC m=+61.649274307" watchObservedRunningTime="2024-07-02 11:34:19.336542985 +0000 UTC m=+61.650933231" Jul 2 11:34:20.205432 kubelet[2066]: I0702 11:34:20.205385 2066 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 11:34:20.206056 kubelet[2066]: I0702 11:34:20.205643 2066 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 11:34:20.949217 env[1193]: time="2024-07-02T11:34:20.949110243Z" level=info msg="StopPodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\"" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.029 [INFO][4011] k8s.go 608: Cleaning up netns ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.029 [INFO][4011] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" iface="eth0" netns="/var/run/netns/cni-2a78b912-61f5-d15f-17be-63752a73b745" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.029 [INFO][4011] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" iface="eth0" netns="/var/run/netns/cni-2a78b912-61f5-d15f-17be-63752a73b745" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.030 [INFO][4011] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" iface="eth0" netns="/var/run/netns/cni-2a78b912-61f5-d15f-17be-63752a73b745" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.030 [INFO][4011] k8s.go 615: Releasing IP address(es) ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.030 [INFO][4011] utils.go 188: Calico CNI releasing IP address ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.073 [INFO][4017] ipam_plugin.go 411: Releasing address using handleID ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.073 [INFO][4017] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.073 [INFO][4017] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.083 [WARNING][4017] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.084 [INFO][4017] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.086 [INFO][4017] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:21.089788 env[1193]: 2024-07-02 11:34:21.088 [INFO][4011] k8s.go 621: Teardown processing complete. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:34:21.096300 env[1193]: time="2024-07-02T11:34:21.094897104Z" level=info msg="TearDown network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\" successfully" Jul 2 11:34:21.096300 env[1193]: time="2024-07-02T11:34:21.094960908Z" level=info msg="StopPodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\" returns successfully" Jul 2 11:34:21.095326 systemd[1]: run-netns-cni\x2d2a78b912\x2d61f5\x2dd15f\x2d17be\x2d63752a73b745.mount: Deactivated successfully. Jul 2 11:34:21.097233 env[1193]: time="2024-07-02T11:34:21.097188340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-qvgm2,Uid:a1577fc7-4f30-4b2a-9821-0946e39523a3,Namespace:kube-system,Attempt:1,}" Jul 2 11:34:21.286982 systemd-networkd[1032]: cali425255246a5: Link UP Jul 2 11:34:21.295685 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 11:34:21.295813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali425255246a5: link becomes ready Jul 2 11:34:21.294909 systemd-networkd[1032]: cali425255246a5: Gained carrier Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.175 [INFO][4023] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0 coredns-76f75df574- kube-system a1577fc7-4f30-4b2a-9821-0946e39523a3 820 0 2024-07-02 11:33:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-z4l15.gb1.brightbox.com coredns-76f75df574-qvgm2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali425255246a5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Namespace="kube-system" Pod="coredns-76f75df574-qvgm2" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.175 [INFO][4023] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Namespace="kube-system" Pod="coredns-76f75df574-qvgm2" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.219 [INFO][4035] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" HandleID="k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.233 [INFO][4035] ipam_plugin.go 264: Auto assigning IP ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" HandleID="k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efe10), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-z4l15.gb1.brightbox.com", "pod":"coredns-76f75df574-qvgm2", "timestamp":"2024-07-02 11:34:21.219861066 +0000 UTC"}, Hostname:"srv-z4l15.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.233 [INFO][4035] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.233 [INFO][4035] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.233 [INFO][4035] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-z4l15.gb1.brightbox.com' Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.237 [INFO][4035] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.244 [INFO][4035] ipam.go 372: Looking up existing affinities for host host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.251 [INFO][4035] ipam.go 489: Trying affinity for 192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.254 [INFO][4035] ipam.go 155: Attempting to load block cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.257 [INFO][4035] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.258 [INFO][4035] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.128/26 handle="k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.262 [INFO][4035] ipam.go 1685: Creating new handle: k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.271 [INFO][4035] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.128/26 handle="k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.279 [INFO][4035] ipam.go 1216: Successfully claimed IPs: [192.168.85.132/26] block=192.168.85.128/26 handle="k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.279 [INFO][4035] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.132/26] handle="k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.279 [INFO][4035] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:21.316025 env[1193]: 2024-07-02 11:34:21.280 [INFO][4035] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.85.132/26] IPv6=[] ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" HandleID="k8s-pod-network.7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.317762 env[1193]: 2024-07-02 11:34:21.282 [INFO][4023] k8s.go 386: Populated endpoint ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Namespace="kube-system" Pod="coredns-76f75df574-qvgm2" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"a1577fc7-4f30-4b2a-9821-0946e39523a3", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"", Pod:"coredns-76f75df574-qvgm2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali425255246a5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:21.317762 env[1193]: 2024-07-02 11:34:21.282 [INFO][4023] k8s.go 387: Calico CNI using IPs: [192.168.85.132/32] ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Namespace="kube-system" Pod="coredns-76f75df574-qvgm2" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.317762 env[1193]: 2024-07-02 11:34:21.282 [INFO][4023] dataplane_linux.go 68: Setting the host side veth name to cali425255246a5 ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Namespace="kube-system" Pod="coredns-76f75df574-qvgm2" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.317762 env[1193]: 2024-07-02 11:34:21.296 [INFO][4023] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Namespace="kube-system" Pod="coredns-76f75df574-qvgm2" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.317762 env[1193]: 2024-07-02 11:34:21.296 [INFO][4023] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Namespace="kube-system" Pod="coredns-76f75df574-qvgm2" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"a1577fc7-4f30-4b2a-9821-0946e39523a3", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d", Pod:"coredns-76f75df574-qvgm2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali425255246a5", MAC:"16:f6:82:cc:91:b6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:21.317762 env[1193]: 2024-07-02 11:34:21.311 [INFO][4023] k8s.go 500: Wrote updated endpoint to datastore ContainerID="7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d" Namespace="kube-system" Pod="coredns-76f75df574-qvgm2" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:34:21.342390 env[1193]: time="2024-07-02T11:34:21.342248811Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:34:21.342390 env[1193]: time="2024-07-02T11:34:21.342332490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:34:21.342390 env[1193]: time="2024-07-02T11:34:21.342351733Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:34:21.342973 env[1193]: time="2024-07-02T11:34:21.342909825Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d pid=4065 runtime=io.containerd.runc.v2 Jul 2 11:34:21.354000 audit[4075]: NETFILTER_CFG table=filter:106 family=2 entries=34 op=nft_register_chain pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:21.354000 audit[4075]: SYSCALL arch=c000003e syscall=46 success=yes exit=18204 a0=3 a1=7ffda0e33850 a2=0 a3=7ffda0e3383c items=0 ppid=3158 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:21.373498 systemd[1]: Started cri-containerd-7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d.scope. Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.407000 audit: BPF prog-id=172 op=LOAD Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4065 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363732303539373634656332333664633634353036663665613236 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4065 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363732303539373634656332333664633634353036663665613236 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit: BPF prog-id=173 op=LOAD Jul 2 11:34:21.408000 audit[4076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1ca0 items=0 ppid=4065 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363732303539373634656332333664633634353036663665613236 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit: BPF prog-id=174 op=LOAD Jul 2 11:34:21.408000 audit[4076]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1ce8 items=0 ppid=4065 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363732303539373634656332333664633634353036663665613236 Jul 2 11:34:21.408000 audit: BPF prog-id=174 op=UNLOAD Jul 2 11:34:21.408000 audit: BPF prog-id=173 op=UNLOAD Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.408000 audit: BPF prog-id=175 op=LOAD Jul 2 11:34:21.408000 audit[4076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00041c0f8 items=0 ppid=4065 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363732303539373634656332333664633634353036663665613236 Jul 2 11:34:21.459874 env[1193]: time="2024-07-02T11:34:21.459801319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-qvgm2,Uid:a1577fc7-4f30-4b2a-9821-0946e39523a3,Namespace:kube-system,Attempt:1,} returns sandbox id \"7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d\"" Jul 2 11:34:21.465595 env[1193]: time="2024-07-02T11:34:21.465551106Z" level=info msg="CreateContainer within sandbox \"7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 11:34:21.479810 env[1193]: time="2024-07-02T11:34:21.479753447Z" level=info msg="CreateContainer within sandbox \"7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1859100524de3da7e25811e9b48521e10c71bdf745b131f32d07a4edcd693c18\"" Jul 2 11:34:21.480854 env[1193]: time="2024-07-02T11:34:21.480810382Z" level=info msg="StartContainer for \"1859100524de3da7e25811e9b48521e10c71bdf745b131f32d07a4edcd693c18\"" Jul 2 11:34:21.506118 systemd[1]: Started cri-containerd-1859100524de3da7e25811e9b48521e10c71bdf745b131f32d07a4edcd693c18.scope. Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.534000 audit: BPF prog-id=176 op=LOAD Jul 2 11:34:21.536000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.536000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4065 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138353931303035323464653364613765323538313165396234383532 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4065 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138353931303035323464653364613765323538313165396234383532 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.537000 audit: BPF prog-id=177 op=LOAD Jul 2 11:34:21.537000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002bb6c0 items=0 ppid=4065 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138353931303035323464653364613765323538313165396234383532 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.543000 audit: BPF prog-id=178 op=LOAD Jul 2 11:34:21.543000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002bb708 items=0 ppid=4065 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138353931303035323464653364613765323538313165396234383532 Jul 2 11:34:21.544000 audit: BPF prog-id=178 op=UNLOAD Jul 2 11:34:21.545000 audit: BPF prog-id=177 op=UNLOAD Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:21.545000 audit: BPF prog-id=179 op=LOAD Jul 2 11:34:21.545000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002bbb18 items=0 ppid=4065 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:21.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138353931303035323464653364613765323538313165396234383532 Jul 2 11:34:21.564357 env[1193]: time="2024-07-02T11:34:21.564275195Z" level=info msg="StartContainer for \"1859100524de3da7e25811e9b48521e10c71bdf745b131f32d07a4edcd693c18\" returns successfully" Jul 2 11:34:22.351590 kubelet[2066]: I0702 11:34:22.351546 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-qvgm2" podStartSLOduration=53.351465444 podStartE2EDuration="53.351465444s" podCreationTimestamp="2024-07-02 11:33:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:34:22.34900411 +0000 UTC m=+64.663394361" watchObservedRunningTime="2024-07-02 11:34:22.351465444 +0000 UTC m=+64.665855691" Jul 2 11:34:22.410000 audit[4150]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:22.414246 kernel: kauditd_printk_skb: 193 callbacks suppressed Jul 2 11:34:22.414415 kernel: audit: type=1325 audit(1719920062.410:1205): table=filter:107 family=2 entries=8 op=nft_register_rule pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:22.410000 audit[4150]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffdf031c90 a2=0 a3=7fffdf031c7c items=0 ppid=2239 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:22.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:22.431521 kernel: audit: type=1300 audit(1719920062.410:1205): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffdf031c90 a2=0 a3=7fffdf031c7c items=0 ppid=2239 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:22.431622 kernel: audit: type=1327 audit(1719920062.410:1205): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:22.431715 kernel: audit: type=1325 audit(1719920062.415:1206): table=nat:108 family=2 entries=44 op=nft_register_rule pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:22.415000 audit[4150]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:22.415000 audit[4150]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffdf031c90 a2=0 a3=7fffdf031c7c items=0 ppid=2239 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:22.443702 kernel: audit: type=1300 audit(1719920062.415:1206): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffdf031c90 a2=0 a3=7fffdf031c7c items=0 ppid=2239 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:22.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:22.447627 kernel: audit: type=1327 audit(1719920062.415:1206): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:22.431000 audit[4152]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4152 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:22.431000 audit[4152]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe08781470 a2=0 a3=7ffe0878145c items=0 ppid=2239 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:22.460040 kernel: audit: type=1325 audit(1719920062.431:1207): table=filter:109 family=2 entries=8 op=nft_register_rule pid=4152 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:22.460133 kernel: audit: type=1300 audit(1719920062.431:1207): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe08781470 a2=0 a3=7ffe0878145c items=0 ppid=2239 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:22.460197 kernel: audit: type=1327 audit(1719920062.431:1207): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:22.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:22.465000 audit[4152]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4152 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:22.465000 audit[4152]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe08781470 a2=0 a3=7ffe0878145c items=0 ppid=2239 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:22.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:22.471727 kernel: audit: type=1325 audit(1719920062.465:1208): table=nat:110 family=2 entries=56 op=nft_register_chain pid=4152 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:22.606296 systemd-networkd[1032]: cali425255246a5: Gained IPv6LL Jul 2 11:34:24.899896 systemd[1]: run-containerd-runc-k8s.io-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a-runc.itCrj6.mount: Deactivated successfully. Jul 2 11:34:28.707000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:28.713643 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 11:34:28.713806 kernel: audit: type=1400 audit(1719920068.707:1209): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:28.707000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da34a0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:28.707000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:28.734410 kernel: audit: type=1300 audit(1719920068.707:1209): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da34a0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:28.734520 kernel: audit: type=1327 audit(1719920068.707:1209): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:28.734610 kernel: audit: type=1400 audit(1719920068.713:1210): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:28.713000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:28.713000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da34c0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:28.748967 kernel: audit: type=1300 audit(1719920068.713:1210): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da34c0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:28.749087 kernel: audit: type=1327 audit(1719920068.713:1210): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:28.713000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:28.756016 kernel: audit: type=1400 audit(1719920068.713:1211): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:28.713000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:28.713000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da34e0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:28.770664 kernel: audit: type=1300 audit(1719920068.713:1211): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da34e0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:28.770785 kernel: audit: type=1327 audit(1719920068.713:1211): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:28.713000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:28.713000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:28.713000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da3500 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:34:28.713000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:34:28.798855 kernel: audit: type=1400 audit(1719920068.713:1212): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:34:40.706948 systemd[1]: run-containerd-runc-k8s.io-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39-runc.0WSHik.mount: Deactivated successfully. Jul 2 11:34:42.774395 kubelet[2066]: I0702 11:34:42.774298 2066 topology_manager.go:215] "Topology Admit Handler" podUID="f7041bf0-286b-43d5-8ed3-dacf413b9310" podNamespace="calico-apiserver" podName="calico-apiserver-6f847548b8-9snjh" Jul 2 11:34:42.789991 kubelet[2066]: I0702 11:34:42.789951 2066 topology_manager.go:215] "Topology Admit Handler" podUID="d7e60fb3-4475-4492-b769-c5104f709328" podNamespace="calico-apiserver" podName="calico-apiserver-6f847548b8-gttkq" Jul 2 11:34:42.813012 systemd[1]: Created slice kubepods-besteffort-podf7041bf0_286b_43d5_8ed3_dacf413b9310.slice. Jul 2 11:34:42.828205 systemd[1]: Created slice kubepods-besteffort-podd7e60fb3_4475_4492_b769_c5104f709328.slice. Jul 2 11:34:42.841000 audit[4224]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=4224 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:42.847609 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 11:34:42.847797 kernel: audit: type=1325 audit(1719920082.841:1213): table=filter:111 family=2 entries=9 op=nft_register_rule pid=4224 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:42.841000 audit[4224]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcb1d4f300 a2=0 a3=7ffcb1d4f2ec items=0 ppid=2239 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:42.876693 kernel: audit: type=1300 audit(1719920082.841:1213): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcb1d4f300 a2=0 a3=7ffcb1d4f2ec items=0 ppid=2239 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:42.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:42.881701 kernel: audit: type=1327 audit(1719920082.841:1213): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:42.884000 audit[4224]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4224 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:42.884000 audit[4224]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb1d4f300 a2=0 a3=7ffcb1d4f2ec items=0 ppid=2239 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:42.902249 kernel: audit: type=1325 audit(1719920082.884:1214): table=nat:112 family=2 entries=20 op=nft_register_rule pid=4224 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:42.902349 kernel: audit: type=1300 audit(1719920082.884:1214): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb1d4f300 a2=0 a3=7ffcb1d4f2ec items=0 ppid=2239 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:42.902425 kernel: audit: type=1327 audit(1719920082.884:1214): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:42.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:42.917000 audit[4226]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:42.917000 audit[4226]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc1bcb3530 a2=0 a3=7ffc1bcb351c items=0 ppid=2239 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:42.930025 kernel: audit: type=1325 audit(1719920082.917:1215): table=filter:113 family=2 entries=10 op=nft_register_rule pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:42.930448 kernel: audit: type=1300 audit(1719920082.917:1215): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc1bcb3530 a2=0 a3=7ffc1bcb351c items=0 ppid=2239 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:42.930527 kernel: audit: type=1327 audit(1719920082.917:1215): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:42.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:42.938919 kubelet[2066]: I0702 11:34:42.938844 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ch92x\" (UniqueName: \"kubernetes.io/projected/d7e60fb3-4475-4492-b769-c5104f709328-kube-api-access-ch92x\") pod \"calico-apiserver-6f847548b8-gttkq\" (UID: \"d7e60fb3-4475-4492-b769-c5104f709328\") " pod="calico-apiserver/calico-apiserver-6f847548b8-gttkq" Jul 2 11:34:42.940822 kubelet[2066]: I0702 11:34:42.940782 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f7041bf0-286b-43d5-8ed3-dacf413b9310-calico-apiserver-certs\") pod \"calico-apiserver-6f847548b8-9snjh\" (UID: \"f7041bf0-286b-43d5-8ed3-dacf413b9310\") " pod="calico-apiserver/calico-apiserver-6f847548b8-9snjh" Jul 2 11:34:42.941093 kubelet[2066]: I0702 11:34:42.941068 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2jfgt\" (UniqueName: \"kubernetes.io/projected/f7041bf0-286b-43d5-8ed3-dacf413b9310-kube-api-access-2jfgt\") pod \"calico-apiserver-6f847548b8-9snjh\" (UID: \"f7041bf0-286b-43d5-8ed3-dacf413b9310\") " pod="calico-apiserver/calico-apiserver-6f847548b8-9snjh" Jul 2 11:34:42.941336 kubelet[2066]: I0702 11:34:42.941312 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d7e60fb3-4475-4492-b769-c5104f709328-calico-apiserver-certs\") pod \"calico-apiserver-6f847548b8-gttkq\" (UID: \"d7e60fb3-4475-4492-b769-c5104f709328\") " pod="calico-apiserver/calico-apiserver-6f847548b8-gttkq" Jul 2 11:34:42.917000 audit[4226]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:42.949717 kernel: audit: type=1325 audit(1719920082.917:1216): table=nat:114 family=2 entries=20 op=nft_register_rule pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:42.917000 audit[4226]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc1bcb3530 a2=0 a3=7ffc1bcb351c items=0 ppid=2239 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:42.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:43.050769 kubelet[2066]: E0702 11:34:43.050587 2066 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 11:34:43.052846 kubelet[2066]: E0702 11:34:43.050952 2066 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 11:34:43.059551 kubelet[2066]: E0702 11:34:43.059521 2066 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d7e60fb3-4475-4492-b769-c5104f709328-calico-apiserver-certs podName:d7e60fb3-4475-4492-b769-c5104f709328 nodeName:}" failed. No retries permitted until 2024-07-02 11:34:43.556537868 +0000 UTC m=+85.870928108 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d7e60fb3-4475-4492-b769-c5104f709328-calico-apiserver-certs") pod "calico-apiserver-6f847548b8-gttkq" (UID: "d7e60fb3-4475-4492-b769-c5104f709328") : secret "calico-apiserver-certs" not found Jul 2 11:34:43.059998 kubelet[2066]: E0702 11:34:43.059969 2066 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f7041bf0-286b-43d5-8ed3-dacf413b9310-calico-apiserver-certs podName:f7041bf0-286b-43d5-8ed3-dacf413b9310 nodeName:}" failed. No retries permitted until 2024-07-02 11:34:43.559950575 +0000 UTC m=+85.874340815 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/f7041bf0-286b-43d5-8ed3-dacf413b9310-calico-apiserver-certs") pod "calico-apiserver-6f847548b8-9snjh" (UID: "f7041bf0-286b-43d5-8ed3-dacf413b9310") : secret "calico-apiserver-certs" not found Jul 2 11:34:43.727406 env[1193]: time="2024-07-02T11:34:43.726381880Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f847548b8-9snjh,Uid:f7041bf0-286b-43d5-8ed3-dacf413b9310,Namespace:calico-apiserver,Attempt:0,}" Jul 2 11:34:43.733862 env[1193]: time="2024-07-02T11:34:43.733799067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f847548b8-gttkq,Uid:d7e60fb3-4475-4492-b769-c5104f709328,Namespace:calico-apiserver,Attempt:0,}" Jul 2 11:34:44.137808 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 11:34:44.137994 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5f0b9aa49de: link becomes ready Jul 2 11:34:44.136396 systemd-networkd[1032]: cali5f0b9aa49de: Link UP Jul 2 11:34:44.142265 systemd-networkd[1032]: cali5f0b9aa49de: Gained carrier Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:43.897 [INFO][4232] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0 calico-apiserver-6f847548b8- calico-apiserver f7041bf0-286b-43d5-8ed3-dacf413b9310 917 0 2024-07-02 11:34:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6f847548b8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-z4l15.gb1.brightbox.com calico-apiserver-6f847548b8-9snjh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5f0b9aa49de [] []}} ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-9snjh" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:43.898 [INFO][4232] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-9snjh" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.034 [INFO][4255] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" HandleID="k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.053 [INFO][4255] ipam_plugin.go 264: Auto assigning IP ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" HandleID="k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314160), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-z4l15.gb1.brightbox.com", "pod":"calico-apiserver-6f847548b8-9snjh", "timestamp":"2024-07-02 11:34:44.034467558 +0000 UTC"}, Hostname:"srv-z4l15.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.053 [INFO][4255] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.053 [INFO][4255] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.054 [INFO][4255] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-z4l15.gb1.brightbox.com' Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.056 [INFO][4255] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.065 [INFO][4255] ipam.go 372: Looking up existing affinities for host host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.084 [INFO][4255] ipam.go 489: Trying affinity for 192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.087 [INFO][4255] ipam.go 155: Attempting to load block cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.095 [INFO][4255] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.095 [INFO][4255] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.128/26 handle="k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.100 [INFO][4255] ipam.go 1685: Creating new handle: k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04 Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.111 [INFO][4255] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.128/26 handle="k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.124 [INFO][4255] ipam.go 1216: Successfully claimed IPs: [192.168.85.133/26] block=192.168.85.128/26 handle="k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.124 [INFO][4255] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.133/26] handle="k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.124 [INFO][4255] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:44.176493 env[1193]: 2024-07-02 11:34:44.125 [INFO][4255] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.85.133/26] IPv6=[] ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" HandleID="k8s-pod-network.15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" Jul 2 11:34:44.177965 env[1193]: 2024-07-02 11:34:44.131 [INFO][4232] k8s.go 386: Populated endpoint ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-9snjh" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0", GenerateName:"calico-apiserver-6f847548b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7041bf0-286b-43d5-8ed3-dacf413b9310", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 34, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f847548b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-6f847548b8-9snjh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f0b9aa49de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:44.177965 env[1193]: 2024-07-02 11:34:44.131 [INFO][4232] k8s.go 387: Calico CNI using IPs: [192.168.85.133/32] ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-9snjh" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" Jul 2 11:34:44.177965 env[1193]: 2024-07-02 11:34:44.131 [INFO][4232] dataplane_linux.go 68: Setting the host side veth name to cali5f0b9aa49de ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-9snjh" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" Jul 2 11:34:44.177965 env[1193]: 2024-07-02 11:34:44.137 [INFO][4232] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-9snjh" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" Jul 2 11:34:44.177965 env[1193]: 2024-07-02 11:34:44.138 [INFO][4232] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-9snjh" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0", GenerateName:"calico-apiserver-6f847548b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7041bf0-286b-43d5-8ed3-dacf413b9310", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 34, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f847548b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04", Pod:"calico-apiserver-6f847548b8-9snjh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f0b9aa49de", MAC:"ce:85:64:e6:54:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:44.177965 env[1193]: 2024-07-02 11:34:44.170 [INFO][4232] k8s.go 500: Wrote updated endpoint to datastore ContainerID="15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-9snjh" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--9snjh-eth0" Jul 2 11:34:44.234718 env[1193]: time="2024-07-02T11:34:44.231744593Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:34:44.234718 env[1193]: time="2024-07-02T11:34:44.231874951Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:34:44.234718 env[1193]: time="2024-07-02T11:34:44.231903637Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:34:44.234718 env[1193]: time="2024-07-02T11:34:44.232284219Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04 pid=4289 runtime=io.containerd.runc.v2 Jul 2 11:34:44.241755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali47cead5859d: link becomes ready Jul 2 11:34:44.242241 systemd-networkd[1032]: cali47cead5859d: Link UP Jul 2 11:34:44.242518 systemd-networkd[1032]: cali47cead5859d: Gained carrier Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:43.926 [INFO][4242] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0 calico-apiserver-6f847548b8- calico-apiserver d7e60fb3-4475-4492-b769-c5104f709328 919 0 2024-07-02 11:34:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6f847548b8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-z4l15.gb1.brightbox.com calico-apiserver-6f847548b8-gttkq eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali47cead5859d [] []}} ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-gttkq" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:43.926 [INFO][4242] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-gttkq" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.057 [INFO][4260] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" HandleID="k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.085 [INFO][4260] ipam_plugin.go 264: Auto assigning IP ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" HandleID="k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003493f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-z4l15.gb1.brightbox.com", "pod":"calico-apiserver-6f847548b8-gttkq", "timestamp":"2024-07-02 11:34:44.057859728 +0000 UTC"}, Hostname:"srv-z4l15.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.085 [INFO][4260] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.124 [INFO][4260] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.125 [INFO][4260] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-z4l15.gb1.brightbox.com' Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.139 [INFO][4260] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.147 [INFO][4260] ipam.go 372: Looking up existing affinities for host host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.162 [INFO][4260] ipam.go 489: Trying affinity for 192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.175 [INFO][4260] ipam.go 155: Attempting to load block cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.192 [INFO][4260] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.128/26 host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.192 [INFO][4260] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.128/26 handle="k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.198 [INFO][4260] ipam.go 1685: Creating new handle: k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4 Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.204 [INFO][4260] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.128/26 handle="k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.227 [INFO][4260] ipam.go 1216: Successfully claimed IPs: [192.168.85.134/26] block=192.168.85.128/26 handle="k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.228 [INFO][4260] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.134/26] handle="k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" host="srv-z4l15.gb1.brightbox.com" Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.228 [INFO][4260] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:34:44.278639 env[1193]: 2024-07-02 11:34:44.228 [INFO][4260] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.85.134/26] IPv6=[] ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" HandleID="k8s-pod-network.c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Workload="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" Jul 2 11:34:44.280230 env[1193]: 2024-07-02 11:34:44.233 [INFO][4242] k8s.go 386: Populated endpoint ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-gttkq" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0", GenerateName:"calico-apiserver-6f847548b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"d7e60fb3-4475-4492-b769-c5104f709328", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 34, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f847548b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-6f847548b8-gttkq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali47cead5859d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:44.280230 env[1193]: 2024-07-02 11:34:44.233 [INFO][4242] k8s.go 387: Calico CNI using IPs: [192.168.85.134/32] ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-gttkq" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" Jul 2 11:34:44.280230 env[1193]: 2024-07-02 11:34:44.233 [INFO][4242] dataplane_linux.go 68: Setting the host side veth name to cali47cead5859d ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-gttkq" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" Jul 2 11:34:44.280230 env[1193]: 2024-07-02 11:34:44.246 [INFO][4242] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-gttkq" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" Jul 2 11:34:44.280230 env[1193]: 2024-07-02 11:34:44.257 [INFO][4242] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-gttkq" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0", GenerateName:"calico-apiserver-6f847548b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"d7e60fb3-4475-4492-b769-c5104f709328", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 34, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f847548b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4", Pod:"calico-apiserver-6f847548b8-gttkq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali47cead5859d", MAC:"8a:72:b3:55:96:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:34:44.280230 env[1193]: 2024-07-02 11:34:44.274 [INFO][4242] k8s.go 500: Wrote updated endpoint to datastore ContainerID="c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4" Namespace="calico-apiserver" Pod="calico-apiserver-6f847548b8-gttkq" WorkloadEndpoint="srv--z4l15.gb1.brightbox.com-k8s-calico--apiserver--6f847548b8--gttkq-eth0" Jul 2 11:34:44.311535 systemd[1]: run-containerd-runc-k8s.io-15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04-runc.hY7jba.mount: Deactivated successfully. Jul 2 11:34:44.322365 systemd[1]: Started cri-containerd-15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04.scope. Jul 2 11:34:44.313000 audit[4302]: NETFILTER_CFG table=filter:115 family=2 entries=51 op=nft_register_chain pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:44.313000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=26260 a0=3 a1=7ffef1de72f0 a2=0 a3=7ffef1de72dc items=0 ppid=3158 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.313000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:44.351163 env[1193]: time="2024-07-02T11:34:44.351057207Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:34:44.351491 env[1193]: time="2024-07-02T11:34:44.351410692Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:34:44.351665 env[1193]: time="2024-07-02T11:34:44.351608878Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:34:44.352080 env[1193]: time="2024-07-02T11:34:44.352024130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4 pid=4323 runtime=io.containerd.runc.v2 Jul 2 11:34:44.405545 systemd[1]: Started cri-containerd-c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4.scope. Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.440000 audit: BPF prog-id=180 op=LOAD Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4289 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393533323933653536333665643235303235383764333631313034 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4289 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393533323933653536333665643235303235383764333631313034 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit: BPF prog-id=181 op=LOAD Jul 2 11:34:44.444000 audit[4300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021afc0 items=0 ppid=4289 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393533323933653536333665643235303235383764333631313034 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit: BPF prog-id=182 op=LOAD Jul 2 11:34:44.444000 audit[4300]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b008 items=0 ppid=4289 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393533323933653536333665643235303235383764333631313034 Jul 2 11:34:44.444000 audit: BPF prog-id=182 op=UNLOAD Jul 2 11:34:44.444000 audit: BPF prog-id=181 op=UNLOAD Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.444000 audit: BPF prog-id=183 op=LOAD Jul 2 11:34:44.444000 audit[4300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021b418 items=0 ppid=4289 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393533323933653536333665643235303235383764333631313034 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.505000 audit: BPF prog-id=184 op=LOAD Jul 2 11:34:44.506000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.506000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4323 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373132653130623236663431373363366565313764653164366132 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4323 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373132653130623236663431373363366565313764653164366132 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit: BPF prog-id=185 op=LOAD Jul 2 11:34:44.507000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003f0f30 items=0 ppid=4323 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373132653130623236663431373363366565313764653164366132 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit: BPF prog-id=186 op=LOAD Jul 2 11:34:44.507000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003f0f78 items=0 ppid=4323 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373132653130623236663431373363366565313764653164366132 Jul 2 11:34:44.507000 audit: BPF prog-id=186 op=UNLOAD Jul 2 11:34:44.507000 audit: BPF prog-id=185 op=UNLOAD Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:44.507000 audit: BPF prog-id=187 op=LOAD Jul 2 11:34:44.507000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003f1388 items=0 ppid=4323 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373132653130623236663431373363366565313764653164366132 Jul 2 11:34:44.519000 audit[4361]: NETFILTER_CFG table=filter:116 family=2 entries=51 op=nft_register_chain pid=4361 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:34:44.519000 audit[4361]: SYSCALL arch=c000003e syscall=46 success=yes exit=25948 a0=3 a1=7ffcafffa860 a2=0 a3=7ffcafffa84c items=0 ppid=3158 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:44.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:34:44.557212 env[1193]: time="2024-07-02T11:34:44.557047403Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f847548b8-9snjh,Uid:f7041bf0-286b-43d5-8ed3-dacf413b9310,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04\"" Jul 2 11:34:44.561103 env[1193]: time="2024-07-02T11:34:44.561055629Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 11:34:44.592186 env[1193]: time="2024-07-02T11:34:44.592125398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f847548b8-gttkq,Uid:d7e60fb3-4475-4492-b769-c5104f709328,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4\"" Jul 2 11:34:45.710981 systemd-networkd[1032]: cali47cead5859d: Gained IPv6LL Jul 2 11:34:45.965957 systemd-networkd[1032]: cali5f0b9aa49de: Gained IPv6LL Jul 2 11:34:48.927257 env[1193]: time="2024-07-02T11:34:48.927052411Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:48.931176 env[1193]: time="2024-07-02T11:34:48.931109082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:48.933395 env[1193]: time="2024-07-02T11:34:48.933352952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:48.934373 env[1193]: time="2024-07-02T11:34:48.934330640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:48.936344 env[1193]: time="2024-07-02T11:34:48.936291122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 11:34:48.942259 env[1193]: time="2024-07-02T11:34:48.940632784Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 11:34:48.945249 env[1193]: time="2024-07-02T11:34:48.945092355Z" level=info msg="CreateContainer within sandbox \"15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 11:34:48.969975 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3232700733.mount: Deactivated successfully. Jul 2 11:34:48.975225 env[1193]: time="2024-07-02T11:34:48.975127887Z" level=info msg="CreateContainer within sandbox \"15953293e5636ed2502587d361104ae761679f53a6719aa57aecf3ae962ffb04\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fdb6c1de9a5d56e0110844164e2d98fe8a3dbcfd6aa17b59ca93a635de0de33a\"" Jul 2 11:34:48.978489 env[1193]: time="2024-07-02T11:34:48.977109875Z" level=info msg="StartContainer for \"fdb6c1de9a5d56e0110844164e2d98fe8a3dbcfd6aa17b59ca93a635de0de33a\"" Jul 2 11:34:49.030261 systemd[1]: Started cri-containerd-fdb6c1de9a5d56e0110844164e2d98fe8a3dbcfd6aa17b59ca93a635de0de33a.scope. Jul 2 11:34:49.043540 systemd[1]: run-containerd-runc-k8s.io-fdb6c1de9a5d56e0110844164e2d98fe8a3dbcfd6aa17b59ca93a635de0de33a-runc.yKhZzZ.mount: Deactivated successfully. Jul 2 11:34:49.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.118248 kernel: kauditd_printk_skb: 122 callbacks suppressed Jul 2 11:34:49.118383 kernel: audit: type=1400 audit(1719920089.105:1255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.129546 kernel: audit: type=1400 audit(1719920089.105:1256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.129752 kernel: audit: type=1400 audit(1719920089.110:1257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.140053 kernel: audit: type=1400 audit(1719920089.110:1258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.150718 kernel: audit: type=1400 audit(1719920089.110:1259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.162116 kernel: audit: type=1400 audit(1719920089.110:1260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.162248 kernel: audit: type=1400 audit(1719920089.110:1261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.173758 kernel: audit: type=1400 audit(1719920089.110:1262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.180745 kernel: audit: type=1400 audit(1719920089.110:1263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.186760 kernel: audit: type=1400 audit(1719920089.117:1264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.117000 audit: BPF prog-id=188 op=LOAD Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4289 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623663316465396135643536653031313038343431363465326439 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4289 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623663316465396135643536653031313038343431363465326439 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.119000 audit: BPF prog-id=189 op=LOAD Jul 2 11:34:49.119000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9ba0 items=0 ppid=4289 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623663316465396135643536653031313038343431363465326439 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit: BPF prog-id=190 op=LOAD Jul 2 11:34:49.128000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9be8 items=0 ppid=4289 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623663316465396135643536653031313038343431363465326439 Jul 2 11:34:49.128000 audit: BPF prog-id=190 op=UNLOAD Jul 2 11:34:49.128000 audit: BPF prog-id=189 op=UNLOAD Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.128000 audit: BPF prog-id=191 op=LOAD Jul 2 11:34:49.128000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d9ff8 items=0 ppid=4289 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623663316465396135643536653031313038343431363465326439 Jul 2 11:34:49.245359 env[1193]: time="2024-07-02T11:34:49.245274688Z" level=info msg="StartContainer for \"fdb6c1de9a5d56e0110844164e2d98fe8a3dbcfd6aa17b59ca93a635de0de33a\" returns successfully" Jul 2 11:34:49.420563 env[1193]: time="2024-07-02T11:34:49.420468683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:49.426059 env[1193]: time="2024-07-02T11:34:49.425956071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:49.431179 env[1193]: time="2024-07-02T11:34:49.430253237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:49.438964 env[1193]: time="2024-07-02T11:34:49.436751429Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:34:49.439592 env[1193]: time="2024-07-02T11:34:49.439550064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 11:34:49.449652 env[1193]: time="2024-07-02T11:34:49.449582492Z" level=info msg="CreateContainer within sandbox \"c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 11:34:49.475484 env[1193]: time="2024-07-02T11:34:49.475368169Z" level=info msg="CreateContainer within sandbox \"c5712e10b26f4173c6ee17de1d6a2cda2dcab74d9ba9e9f072c8a33ffac938f4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"62cd7b48cd1d160cf7609ffe4bd5232f498b3e8d179dd13dc76ebe6a3e58a955\"" Jul 2 11:34:49.476764 env[1193]: time="2024-07-02T11:34:49.476701034Z" level=info msg="StartContainer for \"62cd7b48cd1d160cf7609ffe4bd5232f498b3e8d179dd13dc76ebe6a3e58a955\"" Jul 2 11:34:49.511348 systemd[1]: Started cri-containerd-62cd7b48cd1d160cf7609ffe4bd5232f498b3e8d179dd13dc76ebe6a3e58a955.scope. Jul 2 11:34:49.588000 audit[4436]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:49.588000 audit[4436]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffa2dfdf80 a2=0 a3=7fffa2dfdf6c items=0 ppid=2239 pid=4436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:49.614000 audit[4436]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:49.614000 audit[4436]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffa2dfdf80 a2=0 a3=7fffa2dfdf6c items=0 ppid=2239 pid=4436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:49.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.632000 audit: BPF prog-id=192 op=LOAD Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4323 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636437623438636431643136306366373630396666653462643532 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4323 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636437623438636431643136306366373630396666653462643532 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit: BPF prog-id=193 op=LOAD Jul 2 11:34:49.633000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018bfa0 items=0 ppid=4323 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636437623438636431643136306366373630396666653462643532 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.633000 audit: BPF prog-id=194 op=LOAD Jul 2 11:34:49.633000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018bfe8 items=0 ppid=4323 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636437623438636431643136306366373630396666653462643532 Jul 2 11:34:49.633000 audit: BPF prog-id=194 op=UNLOAD Jul 2 11:34:49.635000 audit: BPF prog-id=193 op=UNLOAD Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:34:49.635000 audit: BPF prog-id=195 op=LOAD Jul 2 11:34:49.635000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bc3f8 items=0 ppid=4323 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:49.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636437623438636431643136306366373630396666653462643532 Jul 2 11:34:49.730434 env[1193]: time="2024-07-02T11:34:49.730354417Z" level=info msg="StartContainer for \"62cd7b48cd1d160cf7609ffe4bd5232f498b3e8d179dd13dc76ebe6a3e58a955\" returns successfully" Jul 2 11:34:50.504548 kubelet[2066]: I0702 11:34:50.504479 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6f847548b8-9snjh" podStartSLOduration=4.127797499 podStartE2EDuration="8.504347627s" podCreationTimestamp="2024-07-02 11:34:42 +0000 UTC" firstStartedPulling="2024-07-02 11:34:44.560497579 +0000 UTC m=+86.874887818" lastFinishedPulling="2024-07-02 11:34:48.937047713 +0000 UTC m=+91.251437946" observedRunningTime="2024-07-02 11:34:49.504963405 +0000 UTC m=+91.819353656" watchObservedRunningTime="2024-07-02 11:34:50.504347627 +0000 UTC m=+92.818737868" Jul 2 11:34:50.567000 audit[4460]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:50.567000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd646aeba0 a2=0 a3=7ffd646aeb8c items=0 ppid=2239 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:50.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:50.577000 audit[4460]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:50.577000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd646aeba0 a2=0 a3=7ffd646aeb8c items=0 ppid=2239 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:50.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:50.749000 audit[4396]: AVC avc: denied { watch } for pid=4396 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_34_43.1059003641/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c674,c931 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c674,c931 tclass=file permissive=0 Jul 2 11:34:50.749000 audit[4396]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000960ba0 a2=fc6 a3=0 items=0 ppid=4289 pid=4396 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c674,c931 key=(null) Jul 2 11:34:50.749000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:34:50.787000 audit[4438]: AVC avc: denied { watch } for pid=4438 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_34_43.1673388353/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c223,c363 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c223,c363 tclass=file permissive=0 Jul 2 11:34:50.787000 audit[4438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00097d1a0 a2=fc6 a3=0 items=0 ppid=4323 pid=4438 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c223,c363 key=(null) Jul 2 11:34:50.787000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:34:50.813319 kubelet[2066]: I0702 11:34:50.813275 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6f847548b8-gttkq" podStartSLOduration=3.965080472 podStartE2EDuration="8.813203026s" podCreationTimestamp="2024-07-02 11:34:42 +0000 UTC" firstStartedPulling="2024-07-02 11:34:44.59478868 +0000 UTC m=+86.909178919" lastFinishedPulling="2024-07-02 11:34:49.442911228 +0000 UTC m=+91.757301473" observedRunningTime="2024-07-02 11:34:50.504898689 +0000 UTC m=+92.819288950" watchObservedRunningTime="2024-07-02 11:34:50.813203026 +0000 UTC m=+93.127593267" Jul 2 11:34:50.860000 audit[4462]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:50.860000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcb2d619a0 a2=0 a3=7ffcb2d6198c items=0 ppid=2239 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:50.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:50.863000 audit[4462]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:50.863000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcb2d619a0 a2=0 a3=7ffcb2d6198c items=0 ppid=2239 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:50.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:51.895000 audit[4470]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=4470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:51.895000 audit[4470]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdc9d18f70 a2=0 a3=7ffdc9d18f5c items=0 ppid=2239 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:51.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:51.898000 audit[4470]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=4470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:34:51.898000 audit[4470]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdc9d18f70 a2=0 a3=7ffdc9d18f5c items=0 ppid=2239 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:34:51.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:34:54.917135 systemd[1]: run-containerd-runc-k8s.io-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a-runc.qjfV9W.mount: Deactivated successfully. Jul 2 11:35:10.700862 systemd[1]: run-containerd-runc-k8s.io-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39-runc.jxHPeC.mount: Deactivated successfully. Jul 2 11:35:11.295000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:11.297875 kernel: kauditd_printk_skb: 134 callbacks suppressed Jul 2 11:35:11.298027 kernel: audit: type=1400 audit(1719920111.295:1301): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:11.295000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011bd280 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:11.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:11.320110 kernel: audit: type=1300 audit(1719920111.295:1301): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011bd280 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:11.320216 kernel: audit: type=1327 audit(1719920111.295:1301): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:11.320657 kernel: audit: type=1400 audit(1719920111.295:1302): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:11.295000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:11.295000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002180900 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:11.335629 kernel: audit: type=1300 audit(1719920111.295:1302): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002180900 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:11.335759 kernel: audit: type=1327 audit(1719920111.295:1302): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:11.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:12.719000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:12.719000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00defc4b0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:35:12.734689 kernel: audit: type=1400 audit(1719920112.719:1303): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:12.734807 kernel: audit: type=1300 audit(1719920112.719:1303): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00defc4b0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:35:12.734861 kernel: audit: type=1327 audit(1719920112.719:1303): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:35:12.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:35:12.721000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:12.747994 kernel: audit: type=1400 audit(1719920112.721:1304): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:12.721000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00defc4e0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:35:12.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:35:12.721000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:12.721000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00709f6e0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:35:12.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:35:12.768000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:12.768000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00defc570 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:35:12.768000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:35:12.788000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:12.788000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00e1de540 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:35:12.788000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:35:12.789000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:12.789000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00b546d60 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:35:12.789000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:35:17.369173 systemd[1]: run-containerd-runc-k8s.io-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a-runc.CAiAAv.mount: Deactivated successfully. Jul 2 11:35:18.918398 env[1193]: time="2024-07-02T11:35:18.918230463Z" level=info msg="StopPodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\"" Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.180 [WARNING][4572] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"a1577fc7-4f30-4b2a-9821-0946e39523a3", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d", Pod:"coredns-76f75df574-qvgm2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali425255246a5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.181 [INFO][4572] k8s.go 608: Cleaning up netns ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.181 [INFO][4572] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" iface="eth0" netns="" Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.182 [INFO][4572] k8s.go 615: Releasing IP address(es) ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.182 [INFO][4572] utils.go 188: Calico CNI releasing IP address ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.298 [INFO][4578] ipam_plugin.go 411: Releasing address using handleID ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.299 [INFO][4578] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.299 [INFO][4578] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.316 [WARNING][4578] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.316 [INFO][4578] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.318 [INFO][4578] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:35:19.326022 env[1193]: 2024-07-02 11:35:19.322 [INFO][4572] k8s.go 621: Teardown processing complete. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:35:19.328058 env[1193]: time="2024-07-02T11:35:19.327093384Z" level=info msg="TearDown network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\" successfully" Jul 2 11:35:19.328058 env[1193]: time="2024-07-02T11:35:19.327438055Z" level=info msg="StopPodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\" returns successfully" Jul 2 11:35:19.330803 env[1193]: time="2024-07-02T11:35:19.330762801Z" level=info msg="RemovePodSandbox for \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\"" Jul 2 11:35:19.331574 env[1193]: time="2024-07-02T11:35:19.331266906Z" level=info msg="Forcibly stopping sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\"" Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.404 [WARNING][4598] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"a1577fc7-4f30-4b2a-9821-0946e39523a3", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-z4l15.gb1.brightbox.com", ContainerID:"7d672059764ec236dc64506f6ea26c18bbdcbc90fbe7a98db2fd9d599e58e32d", Pod:"coredns-76f75df574-qvgm2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali425255246a5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.404 [INFO][4598] k8s.go 608: Cleaning up netns ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.405 [INFO][4598] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" iface="eth0" netns="" Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.405 [INFO][4598] k8s.go 615: Releasing IP address(es) ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.405 [INFO][4598] utils.go 188: Calico CNI releasing IP address ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.439 [INFO][4604] ipam_plugin.go 411: Releasing address using handleID ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.439 [INFO][4604] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.439 [INFO][4604] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.449 [WARNING][4604] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.449 [INFO][4604] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" HandleID="k8s-pod-network.bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Workload="srv--z4l15.gb1.brightbox.com-k8s-coredns--76f75df574--qvgm2-eth0" Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.452 [INFO][4604] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:35:19.458564 env[1193]: 2024-07-02 11:35:19.455 [INFO][4598] k8s.go 621: Teardown processing complete. ContainerID="bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642" Jul 2 11:35:19.460659 env[1193]: time="2024-07-02T11:35:19.458612397Z" level=info msg="TearDown network for sandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\" successfully" Jul 2 11:35:19.465573 env[1193]: time="2024-07-02T11:35:19.465505588Z" level=info msg="RemovePodSandbox \"bd94dab043382df555b430470570d87e960ba49a968dc0a58c29996cf6937642\" returns successfully" Jul 2 11:35:24.900621 systemd[1]: run-containerd-runc-k8s.io-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a-runc.cz3ckj.mount: Deactivated successfully. Jul 2 11:35:28.717107 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 11:35:28.717785 kernel: audit: type=1400 audit(1719920128.714:1309): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:28.714000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:28.716000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:28.729976 kernel: audit: type=1400 audit(1719920128.716:1310): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:28.716000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013014e0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:28.738355 kernel: audit: type=1300 audit(1719920128.716:1310): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013014e0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:28.738795 kernel: audit: type=1327 audit(1719920128.716:1310): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:28.716000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:28.714000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001278b20 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:28.714000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:28.764612 kernel: audit: type=1300 audit(1719920128.714:1309): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001278b20 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:28.764717 kernel: audit: type=1327 audit(1719920128.714:1309): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:28.764801 kernel: audit: type=1400 audit(1719920128.716:1311): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:28.716000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:28.716000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001301500 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:28.779687 kernel: audit: type=1300 audit(1719920128.716:1311): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001301500 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:28.779824 kernel: audit: type=1400 audit(1719920128.716:1312): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:28.716000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:35:28.716000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001278b40 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:28.794219 kernel: audit: type=1300 audit(1719920128.716:1312): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001278b40 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:35:28.716000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:28.716000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:35:34.843427 systemd[1]: Started sshd@7-10.230.62.206:22-147.75.109.163:53748.service. Jul 2 11:35:34.856044 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 11:35:34.856182 kernel: audit: type=1130 audit(1719920134.846:1313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.62.206:22-147.75.109.163:53748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:34.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.62.206:22-147.75.109.163:53748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:35.813429 sshd[4647]: Accepted publickey for core from 147.75.109.163 port 53748 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:35:35.812000 audit[4647]: USER_ACCT pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:35.820711 kernel: audit: type=1101 audit(1719920135.812:1314): pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:35.820000 audit[4647]: CRED_ACQ pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:35.832011 kernel: audit: type=1103 audit(1719920135.820:1315): pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:35.832144 kernel: audit: type=1006 audit(1719920135.820:1316): pid=4647 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Jul 2 11:35:35.832523 kernel: audit: type=1300 audit(1719920135.820:1316): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc18e13700 a2=3 a3=0 items=0 ppid=1 pid=4647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:35:35.820000 audit[4647]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc18e13700 a2=3 a3=0 items=0 ppid=1 pid=4647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:35:35.820000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:35:35.842701 kernel: audit: type=1327 audit(1719920135.820:1316): proctitle=737368643A20636F7265205B707269765D Jul 2 11:35:35.842870 sshd[4647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:35:35.871741 systemd-logind[1186]: New session 8 of user core. Jul 2 11:35:35.873960 systemd[1]: Started session-8.scope. Jul 2 11:35:35.885000 audit[4647]: USER_START pid=4647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:35.892000 audit[4653]: CRED_ACQ pid=4653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:35.917598 kernel: audit: type=1105 audit(1719920135.885:1317): pid=4647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:35.918096 kernel: audit: type=1103 audit(1719920135.892:1318): pid=4653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:37.076883 sshd[4647]: pam_unix(sshd:session): session closed for user core Jul 2 11:35:37.079000 audit[4647]: USER_END pid=4647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:37.091724 kernel: audit: type=1106 audit(1719920137.079:1319): pid=4647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:37.098909 kernel: audit: type=1104 audit(1719920137.079:1320): pid=4647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:37.079000 audit[4647]: CRED_DISP pid=4647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:37.099194 systemd[1]: sshd@7-10.230.62.206:22-147.75.109.163:53748.service: Deactivated successfully. Jul 2 11:35:37.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.62.206:22-147.75.109.163:53748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:37.101146 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 11:35:37.102339 systemd-logind[1186]: Session 8 logged out. Waiting for processes to exit. Jul 2 11:35:37.104737 systemd-logind[1186]: Removed session 8. Jul 2 11:35:40.699349 systemd[1]: run-containerd-runc-k8s.io-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39-runc.3L36iO.mount: Deactivated successfully. Jul 2 11:35:42.226107 systemd[1]: Started sshd@8-10.230.62.206:22-147.75.109.163:53756.service. Jul 2 11:35:42.233068 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:35:42.233229 kernel: audit: type=1130 audit(1719920142.226:1322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.62.206:22-147.75.109.163:53756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:42.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.62.206:22-147.75.109.163:53756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:43.118000 audit[4685]: USER_ACCT pid=4685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.121130 sshd[4685]: Accepted publickey for core from 147.75.109.163 port 53756 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:35:43.126823 kernel: audit: type=1101 audit(1719920143.118:1323): pid=4685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.127000 audit[4685]: CRED_ACQ pid=4685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.135118 sshd[4685]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:35:43.138496 kernel: audit: type=1103 audit(1719920143.127:1324): pid=4685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.138627 kernel: audit: type=1006 audit(1719920143.127:1325): pid=4685 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Jul 2 11:35:43.127000 audit[4685]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97da1b70 a2=3 a3=0 items=0 ppid=1 pid=4685 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:35:43.127000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:35:43.149096 kernel: audit: type=1300 audit(1719920143.127:1325): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97da1b70 a2=3 a3=0 items=0 ppid=1 pid=4685 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:35:43.149499 kernel: audit: type=1327 audit(1719920143.127:1325): proctitle=737368643A20636F7265205B707269765D Jul 2 11:35:43.152640 systemd-logind[1186]: New session 9 of user core. Jul 2 11:35:43.154624 systemd[1]: Started session-9.scope. Jul 2 11:35:43.163000 audit[4685]: USER_START pid=4685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.172735 kernel: audit: type=1105 audit(1719920143.163:1326): pid=4685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.172000 audit[4687]: CRED_ACQ pid=4687 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.179770 kernel: audit: type=1103 audit(1719920143.172:1327): pid=4687 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.931144 sshd[4685]: pam_unix(sshd:session): session closed for user core Jul 2 11:35:43.933000 audit[4685]: USER_END pid=4685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.936053 systemd[1]: sshd@8-10.230.62.206:22-147.75.109.163:53756.service: Deactivated successfully. Jul 2 11:35:43.937374 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 11:35:43.939172 systemd-logind[1186]: Session 9 logged out. Waiting for processes to exit. Jul 2 11:35:43.940504 systemd-logind[1186]: Removed session 9. Jul 2 11:35:43.942788 kernel: audit: type=1106 audit(1719920143.933:1328): pid=4685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.942907 kernel: audit: type=1104 audit(1719920143.933:1329): pid=4685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.933000 audit[4685]: CRED_DISP pid=4685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:43.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.62.206:22-147.75.109.163:53756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:49.096084 systemd[1]: Started sshd@9-10.230.62.206:22-147.75.109.163:45112.service. Jul 2 11:35:49.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.62.206:22-147.75.109.163:45112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:49.101551 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:35:49.101739 kernel: audit: type=1130 audit(1719920149.095:1331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.62.206:22-147.75.109.163:45112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:49.990000 audit[4715]: USER_ACCT pid=4715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:49.999057 kernel: audit: type=1101 audit(1719920149.990:1332): pid=4715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:49.999174 sshd[4715]: Accepted publickey for core from 147.75.109.163 port 45112 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:35:49.997000 audit[4715]: CRED_ACQ pid=4715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.005722 kernel: audit: type=1103 audit(1719920149.997:1333): pid=4715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:49.997000 audit[4715]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcadafd330 a2=3 a3=0 items=0 ppid=1 pid=4715 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:35:50.010236 sshd[4715]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:35:50.016738 kernel: audit: type=1006 audit(1719920149.997:1334): pid=4715 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 11:35:50.016842 kernel: audit: type=1300 audit(1719920149.997:1334): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcadafd330 a2=3 a3=0 items=0 ppid=1 pid=4715 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:35:49.997000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:35:50.019638 kernel: audit: type=1327 audit(1719920149.997:1334): proctitle=737368643A20636F7265205B707269765D Jul 2 11:35:50.027213 systemd-logind[1186]: New session 10 of user core. Jul 2 11:35:50.029006 systemd[1]: Started session-10.scope. Jul 2 11:35:50.037000 audit[4715]: USER_START pid=4715 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.040000 audit[4717]: CRED_ACQ pid=4717 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.053696 kernel: audit: type=1105 audit(1719920150.037:1335): pid=4715 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.054141 kernel: audit: type=1103 audit(1719920150.040:1336): pid=4717 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.737263 sshd[4715]: pam_unix(sshd:session): session closed for user core Jul 2 11:35:50.741000 audit[4715]: USER_END pid=4715 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.745037 systemd[1]: sshd@9-10.230.62.206:22-147.75.109.163:45112.service: Deactivated successfully. Jul 2 11:35:50.746465 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 11:35:50.748077 systemd-logind[1186]: Session 10 logged out. Waiting for processes to exit. Jul 2 11:35:50.750397 kernel: audit: type=1106 audit(1719920150.741:1337): pid=4715 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.750512 kernel: audit: type=1104 audit(1719920150.741:1338): pid=4715 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.741000 audit[4715]: CRED_DISP pid=4715 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:50.749944 systemd-logind[1186]: Removed session 10. Jul 2 11:35:50.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.62.206:22-147.75.109.163:45112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:50.751000 audit[4396]: AVC avc: denied { watch } for pid=4396 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_34_43.1059003641/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c674,c931 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c674,c931 tclass=file permissive=0 Jul 2 11:35:50.751000 audit[4396]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001500280 a2=fc6 a3=0 items=0 ppid=4289 pid=4396 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c674,c931 key=(null) Jul 2 11:35:50.751000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:35:50.790000 audit[4438]: AVC avc: denied { watch } for pid=4438 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_34_43.1673388353/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c223,c363 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c223,c363 tclass=file permissive=0 Jul 2 11:35:50.790000 audit[4438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c36000 a2=fc6 a3=0 items=0 ppid=4323 pid=4438 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c223,c363 key=(null) Jul 2 11:35:50.790000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:35:50.886682 systemd[1]: Started sshd@10-10.230.62.206:22-147.75.109.163:45118.service. Jul 2 11:35:50.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.62.206:22-147.75.109.163:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:51.773000 audit[4727]: USER_ACCT pid=4727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:51.775641 sshd[4727]: Accepted publickey for core from 147.75.109.163 port 45118 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:35:51.776000 audit[4727]: CRED_ACQ pid=4727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:51.776000 audit[4727]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe102c7720 a2=3 a3=0 items=0 ppid=1 pid=4727 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:35:51.776000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:35:51.778342 sshd[4727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:35:51.787522 systemd[1]: Started session-11.scope. Jul 2 11:35:51.790199 systemd-logind[1186]: New session 11 of user core. Jul 2 11:35:51.800000 audit[4727]: USER_START pid=4727 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:51.802000 audit[4729]: CRED_ACQ pid=4729 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:52.587054 sshd[4727]: pam_unix(sshd:session): session closed for user core Jul 2 11:35:52.589000 audit[4727]: USER_END pid=4727 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:52.590000 audit[4727]: CRED_DISP pid=4727 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:52.593286 systemd[1]: sshd@10-10.230.62.206:22-147.75.109.163:45118.service: Deactivated successfully. Jul 2 11:35:52.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.62.206:22-147.75.109.163:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:52.594628 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 11:35:52.596386 systemd-logind[1186]: Session 11 logged out. Waiting for processes to exit. Jul 2 11:35:52.598519 systemd-logind[1186]: Removed session 11. Jul 2 11:35:52.734467 systemd[1]: Started sshd@11-10.230.62.206:22-147.75.109.163:42314.service. Jul 2 11:35:52.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.62.206:22-147.75.109.163:42314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:53.615294 sshd[4737]: Accepted publickey for core from 147.75.109.163 port 42314 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:35:53.614000 audit[4737]: USER_ACCT pid=4737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:53.617000 audit[4737]: CRED_ACQ pid=4737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:53.617000 audit[4737]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe29af95e0 a2=3 a3=0 items=0 ppid=1 pid=4737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:35:53.617000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:35:53.620529 sshd[4737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:35:53.631566 systemd-logind[1186]: New session 12 of user core. Jul 2 11:35:53.632442 systemd[1]: Started session-12.scope. Jul 2 11:35:53.643000 audit[4737]: USER_START pid=4737 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:53.646000 audit[4739]: CRED_ACQ pid=4739 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:54.337519 sshd[4737]: pam_unix(sshd:session): session closed for user core Jul 2 11:35:54.339000 audit[4737]: USER_END pid=4737 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:54.344225 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 11:35:54.344827 kernel: audit: type=1106 audit(1719920154.339:1357): pid=4737 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:54.346252 systemd-logind[1186]: Session 12 logged out. Waiting for processes to exit. Jul 2 11:35:54.348798 systemd[1]: sshd@11-10.230.62.206:22-147.75.109.163:42314.service: Deactivated successfully. Jul 2 11:35:54.350256 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 11:35:54.339000 audit[4737]: CRED_DISP pid=4737 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:54.352195 systemd-logind[1186]: Removed session 12. Jul 2 11:35:54.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.62.206:22-147.75.109.163:42314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:54.365314 kernel: audit: type=1104 audit(1719920154.339:1358): pid=4737 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:35:54.365506 kernel: audit: type=1131 audit(1719920154.343:1359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.62.206:22-147.75.109.163:42314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:54.912509 systemd[1]: run-containerd-runc-k8s.io-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a-runc.IObjkU.mount: Deactivated successfully. Jul 2 11:35:59.509158 systemd[1]: Started sshd@12-10.230.62.206:22-147.75.109.163:42320.service. Jul 2 11:35:59.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.62.206:22-147.75.109.163:42320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:35:59.520699 kernel: audit: type=1130 audit(1719920159.509:1360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.62.206:22-147.75.109.163:42320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:00.469047 sshd[4779]: Accepted publickey for core from 147.75.109.163 port 42320 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:00.468000 audit[4779]: USER_ACCT pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:00.476729 kernel: audit: type=1101 audit(1719920160.468:1361): pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:00.476000 audit[4779]: CRED_ACQ pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:00.479470 sshd[4779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:00.484865 kernel: audit: type=1103 audit(1719920160.476:1362): pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:00.490689 kernel: audit: type=1006 audit(1719920160.477:1363): pid=4779 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 2 11:36:00.477000 audit[4779]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7e2dbd70 a2=3 a3=0 items=0 ppid=1 pid=4779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:00.477000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:00.500468 kernel: audit: type=1300 audit(1719920160.477:1363): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7e2dbd70 a2=3 a3=0 items=0 ppid=1 pid=4779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:00.500637 kernel: audit: type=1327 audit(1719920160.477:1363): proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:00.501680 systemd-logind[1186]: New session 13 of user core. Jul 2 11:36:00.502861 systemd[1]: Started session-13.scope. Jul 2 11:36:00.510000 audit[4779]: USER_START pid=4779 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:00.513000 audit[4781]: CRED_ACQ pid=4781 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:00.525482 kernel: audit: type=1105 audit(1719920160.510:1364): pid=4779 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:00.525600 kernel: audit: type=1103 audit(1719920160.513:1365): pid=4781 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:01.302954 sshd[4779]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:01.305000 audit[4779]: USER_END pid=4779 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:01.315704 kernel: audit: type=1106 audit(1719920161.305:1366): pid=4779 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:01.316000 audit[4779]: CRED_DISP pid=4779 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:01.320139 systemd[1]: sshd@12-10.230.62.206:22-147.75.109.163:42320.service: Deactivated successfully. Jul 2 11:36:01.321564 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 11:36:01.323783 kernel: audit: type=1104 audit(1719920161.316:1367): pid=4779 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:01.325012 systemd-logind[1186]: Session 13 logged out. Waiting for processes to exit. Jul 2 11:36:01.326488 systemd-logind[1186]: Removed session 13. Jul 2 11:36:01.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.62.206:22-147.75.109.163:42320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:06.448129 systemd[1]: Started sshd@13-10.230.62.206:22-147.75.109.163:39334.service. Jul 2 11:36:06.453317 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:36:06.453462 kernel: audit: type=1130 audit(1719920166.447:1369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.62.206:22-147.75.109.163:39334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:06.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.62.206:22-147.75.109.163:39334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:07.331000 audit[4795]: USER_ACCT pid=4795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:07.337513 sshd[4795]: Accepted publickey for core from 147.75.109.163 port 39334 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:07.343908 kernel: audit: type=1101 audit(1719920167.331:1370): pid=4795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:07.345957 sshd[4795]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:07.343000 audit[4795]: CRED_ACQ pid=4795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:07.363466 kernel: audit: type=1103 audit(1719920167.343:1371): pid=4795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:07.363613 kernel: audit: type=1006 audit(1719920167.343:1372): pid=4795 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 2 11:36:07.363692 kernel: audit: type=1300 audit(1719920167.343:1372): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0e8887e0 a2=3 a3=0 items=0 ppid=1 pid=4795 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:07.343000 audit[4795]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0e8887e0 a2=3 a3=0 items=0 ppid=1 pid=4795 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:07.360394 systemd[1]: Started session-14.scope. Jul 2 11:36:07.362558 systemd-logind[1186]: New session 14 of user core. Jul 2 11:36:07.370150 kernel: audit: type=1327 audit(1719920167.343:1372): proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:07.343000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:07.374000 audit[4795]: USER_START pid=4795 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:07.384702 kernel: audit: type=1105 audit(1719920167.374:1373): pid=4795 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:07.384000 audit[4802]: CRED_ACQ pid=4802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:07.393704 kernel: audit: type=1103 audit(1719920167.384:1374): pid=4802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:08.096257 sshd[4795]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:08.096000 audit[4795]: USER_END pid=4795 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:08.101474 systemd-logind[1186]: Session 14 logged out. Waiting for processes to exit. Jul 2 11:36:08.103661 systemd[1]: sshd@13-10.230.62.206:22-147.75.109.163:39334.service: Deactivated successfully. Jul 2 11:36:08.105150 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 11:36:08.108056 systemd-logind[1186]: Removed session 14. Jul 2 11:36:08.121005 kernel: audit: type=1106 audit(1719920168.096:1375): pid=4795 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:08.121113 kernel: audit: type=1104 audit(1719920168.096:1376): pid=4795 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:08.096000 audit[4795]: CRED_DISP pid=4795 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:08.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.62.206:22-147.75.109.163:39334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:10.700025 systemd[1]: run-containerd-runc-k8s.io-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39-runc.76MndT.mount: Deactivated successfully. Jul 2 11:36:11.299000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:11.299000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012b6810 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:36:11.300000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:11.300000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00134f3a0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:36:11.300000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:36:11.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:36:12.725745 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 11:36:12.726053 kernel: audit: type=1400 audit(1719920172.723:1380): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.723000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.723000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009262300 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.739707 kernel: audit: type=1300 audit(1719920172.723:1380): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009262300 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:12.747395 kernel: audit: type=1327 audit(1719920172.723:1380): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:12.747508 kernel: audit: type=1400 audit(1719920172.723:1381): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.723000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.723000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009262330 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.762554 kernel: audit: type=1300 audit(1719920172.723:1381): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009262330 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.762655 kernel: audit: type=1327 audit(1719920172.723:1381): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:12.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:12.723000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.775800 kernel: audit: type=1400 audit(1719920172.723:1382): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.723000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a41c9e0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.784031 kernel: audit: type=1300 audit(1719920172.723:1382): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a41c9e0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.784150 kernel: audit: type=1327 audit(1719920172.723:1382): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:12.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:12.769000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.797769 kernel: audit: type=1400 audit(1719920172.769:1383): avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.769000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00955e930 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.769000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:12.789000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.789000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00448a9e0 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.789000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:12.790000 audit[1936]: AVC avc: denied { watch } for pid=1936 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:12.790000 audit[1936]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009262d80 a2=fc6 a3=0 items=0 ppid=1787 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c719 key=(null) Jul 2 11:36:12.790000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E36322E323036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 11:36:13.253957 systemd[1]: Started sshd@14-10.230.62.206:22-147.75.109.163:36878.service. Jul 2 11:36:13.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.62.206:22-147.75.109.163:36878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:14.152000 audit[4834]: USER_ACCT pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:14.153408 sshd[4834]: Accepted publickey for core from 147.75.109.163 port 36878 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:14.154000 audit[4834]: CRED_ACQ pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:14.154000 audit[4834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5cbeac00 a2=3 a3=0 items=0 ppid=1 pid=4834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:14.154000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:14.156539 sshd[4834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:14.164825 systemd-logind[1186]: New session 15 of user core. Jul 2 11:36:14.170197 systemd[1]: Started session-15.scope. Jul 2 11:36:14.179000 audit[4834]: USER_START pid=4834 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:14.181000 audit[4836]: CRED_ACQ pid=4836 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:14.934172 sshd[4834]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:14.936000 audit[4834]: USER_END pid=4834 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:14.936000 audit[4834]: CRED_DISP pid=4834 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:14.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.62.206:22-147.75.109.163:36878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:14.939829 systemd[1]: sshd@14-10.230.62.206:22-147.75.109.163:36878.service: Deactivated successfully. Jul 2 11:36:14.941043 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 11:36:14.946073 systemd-logind[1186]: Session 15 logged out. Waiting for processes to exit. Jul 2 11:36:14.948194 systemd-logind[1186]: Removed session 15. Jul 2 11:36:15.080398 systemd[1]: Started sshd@15-10.230.62.206:22-147.75.109.163:36888.service. Jul 2 11:36:15.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.62.206:22-147.75.109.163:36888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:15.987000 audit[4846]: USER_ACCT pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:15.988489 sshd[4846]: Accepted publickey for core from 147.75.109.163 port 36888 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:15.989000 audit[4846]: CRED_ACQ pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:15.989000 audit[4846]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d517280 a2=3 a3=0 items=0 ppid=1 pid=4846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:15.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:15.990773 sshd[4846]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:15.999116 systemd[1]: Started session-16.scope. Jul 2 11:36:15.999758 systemd-logind[1186]: New session 16 of user core. Jul 2 11:36:16.007000 audit[4846]: USER_START pid=4846 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:16.009000 audit[4848]: CRED_ACQ pid=4848 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:17.088980 sshd[4846]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:17.095000 audit[4846]: USER_END pid=4846 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:17.097000 audit[4846]: CRED_DISP pid=4846 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:17.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.62.206:22-147.75.109.163:36888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:17.101497 systemd[1]: sshd@15-10.230.62.206:22-147.75.109.163:36888.service: Deactivated successfully. Jul 2 11:36:17.102948 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 11:36:17.105205 systemd-logind[1186]: Session 16 logged out. Waiting for processes to exit. Jul 2 11:36:17.106942 systemd-logind[1186]: Removed session 16. Jul 2 11:36:17.245540 systemd[1]: Started sshd@16-10.230.62.206:22-147.75.109.163:36898.service. Jul 2 11:36:17.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.62.206:22-147.75.109.163:36898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:17.370065 systemd[1]: run-containerd-runc-k8s.io-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a-runc.ouowVh.mount: Deactivated successfully. Jul 2 11:36:18.172000 audit[4861]: USER_ACCT pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:18.173527 sshd[4861]: Accepted publickey for core from 147.75.109.163 port 36898 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:18.174523 kernel: kauditd_printk_skb: 31 callbacks suppressed Jul 2 11:36:18.174728 kernel: audit: type=1101 audit(1719920178.172:1405): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:18.181000 audit[4861]: CRED_ACQ pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:18.183666 sshd[4861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:18.188699 kernel: audit: type=1103 audit(1719920178.181:1406): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:18.193709 kernel: audit: type=1006 audit(1719920178.181:1407): pid=4861 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 11:36:18.181000 audit[4861]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcb06c230 a2=3 a3=0 items=0 ppid=1 pid=4861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:18.204960 kernel: audit: type=1300 audit(1719920178.181:1407): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcb06c230 a2=3 a3=0 items=0 ppid=1 pid=4861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:18.181000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:18.208707 kernel: audit: type=1327 audit(1719920178.181:1407): proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:18.213307 systemd[1]: Started session-17.scope. Jul 2 11:36:18.213902 systemd-logind[1186]: New session 17 of user core. Jul 2 11:36:18.223000 audit[4861]: USER_START pid=4861 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:18.232737 kernel: audit: type=1105 audit(1719920178.223:1408): pid=4861 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:18.232000 audit[4884]: CRED_ACQ pid=4884 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:18.239777 kernel: audit: type=1103 audit(1719920178.232:1409): pid=4884 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:21.641000 audit[4898]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:36:21.641000 audit[4898]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdfafea770 a2=0 a3=7ffdfafea75c items=0 ppid=2239 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:21.654807 kernel: audit: type=1325 audit(1719920181.641:1410): table=filter:125 family=2 entries=20 op=nft_register_rule pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:36:21.654963 kernel: audit: type=1300 audit(1719920181.641:1410): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdfafea770 a2=0 a3=7ffdfafea75c items=0 ppid=2239 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:21.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:36:21.659463 kernel: audit: type=1327 audit(1719920181.641:1410): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:36:21.644000 audit[4898]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:36:21.644000 audit[4898]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdfafea770 a2=0 a3=0 items=0 ppid=2239 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:21.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:36:21.737000 audit[4900]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:36:21.737000 audit[4900]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffda515a8f0 a2=0 a3=7ffda515a8dc items=0 ppid=2239 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:21.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:36:21.739000 audit[4900]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:36:21.746790 sshd[4861]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:21.739000 audit[4900]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffda515a8f0 a2=0 a3=0 items=0 ppid=2239 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:21.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:36:21.750000 audit[4861]: USER_END pid=4861 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:21.750000 audit[4861]: CRED_DISP pid=4861 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:21.761339 systemd[1]: sshd@16-10.230.62.206:22-147.75.109.163:36898.service: Deactivated successfully. Jul 2 11:36:21.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.62.206:22-147.75.109.163:36898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:21.763393 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 11:36:21.765010 systemd-logind[1186]: Session 17 logged out. Waiting for processes to exit. Jul 2 11:36:21.766532 systemd-logind[1186]: Removed session 17. Jul 2 11:36:21.892372 systemd[1]: Started sshd@17-10.230.62.206:22-147.75.109.163:36902.service. Jul 2 11:36:21.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.62.206:22-147.75.109.163:36902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:22.793346 sshd[4903]: Accepted publickey for core from 147.75.109.163 port 36902 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:22.791000 audit[4903]: USER_ACCT pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:22.793000 audit[4903]: CRED_ACQ pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:22.793000 audit[4903]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4dbfeed0 a2=3 a3=0 items=0 ppid=1 pid=4903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:22.793000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:22.796524 sshd[4903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:22.803737 systemd-logind[1186]: New session 18 of user core. Jul 2 11:36:22.805362 systemd[1]: Started session-18.scope. Jul 2 11:36:22.812000 audit[4903]: USER_START pid=4903 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:22.815000 audit[4905]: CRED_ACQ pid=4905 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:23.991296 sshd[4903]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:23.996147 kernel: kauditd_printk_skb: 20 callbacks suppressed Jul 2 11:36:23.996240 kernel: audit: type=1106 audit(1719920183.992:1423): pid=4903 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:23.992000 audit[4903]: USER_END pid=4903 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:24.003496 systemd[1]: sshd@17-10.230.62.206:22-147.75.109.163:36902.service: Deactivated successfully. Jul 2 11:36:23.992000 audit[4903]: CRED_DISP pid=4903 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:24.008087 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 11:36:24.014252 systemd-logind[1186]: Session 18 logged out. Waiting for processes to exit. Jul 2 11:36:24.014708 kernel: audit: type=1104 audit(1719920183.992:1424): pid=4903 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:24.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.62.206:22-147.75.109.163:36902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:24.022908 systemd-logind[1186]: Removed session 18. Jul 2 11:36:24.023785 kernel: audit: type=1131 audit(1719920184.002:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.62.206:22-147.75.109.163:36902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:24.135699 systemd[1]: Started sshd@18-10.230.62.206:22-147.75.109.163:58260.service. Jul 2 11:36:24.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.62.206:22-147.75.109.163:58260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:24.144803 kernel: audit: type=1130 audit(1719920184.135:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.62.206:22-147.75.109.163:58260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:24.916791 systemd[1]: run-containerd-runc-k8s.io-17ff179d59179370229c2214d89a51fcf6f255f2a3f3731c0d563378857a556a-runc.MA87nM.mount: Deactivated successfully. Jul 2 11:36:25.034000 audit[4912]: USER_ACCT pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.042134 sshd[4912]: Accepted publickey for core from 147.75.109.163 port 58260 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:25.047843 kernel: audit: type=1101 audit(1719920185.034:1427): pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.049925 kernel: audit: type=1103 audit(1719920185.047:1428): pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.047000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.060039 kernel: audit: type=1006 audit(1719920185.047:1429): pid=4912 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Jul 2 11:36:25.060223 kernel: audit: type=1300 audit(1719920185.047:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef8952f00 a2=3 a3=0 items=0 ppid=1 pid=4912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:25.047000 audit[4912]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef8952f00 a2=3 a3=0 items=0 ppid=1 pid=4912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:25.059868 sshd[4912]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:25.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:25.069723 kernel: audit: type=1327 audit(1719920185.047:1429): proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:25.081759 systemd-logind[1186]: New session 19 of user core. Jul 2 11:36:25.082292 systemd[1]: Started session-19.scope. Jul 2 11:36:25.090000 audit[4912]: USER_START pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.101330 kernel: audit: type=1105 audit(1719920185.090:1430): pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.099000 audit[4932]: CRED_ACQ pid=4932 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.799057 sshd[4912]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:25.799000 audit[4912]: USER_END pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.800000 audit[4912]: CRED_DISP pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:25.803707 systemd[1]: sshd@18-10.230.62.206:22-147.75.109.163:58260.service: Deactivated successfully. Jul 2 11:36:25.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.62.206:22-147.75.109.163:58260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:25.805128 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 11:36:25.806045 systemd-logind[1186]: Session 19 logged out. Waiting for processes to exit. Jul 2 11:36:25.807883 systemd-logind[1186]: Removed session 19. Jul 2 11:36:28.161000 audit[4947]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=4947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:36:28.161000 audit[4947]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe7538f7d0 a2=0 a3=7ffe7538f7bc items=0 ppid=2239 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:28.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:36:28.165000 audit[4947]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=4947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:36:28.165000 audit[4947]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe7538f7d0 a2=0 a3=7ffe7538f7bc items=0 ppid=2239 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:28.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:36:28.721000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:28.721000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026374e0 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:36:28.721000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:36:28.722000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:28.722000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002637500 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:36:28.722000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:36:28.722000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:28.722000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0029a2960 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:36:28.722000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:36:28.724000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:36:28.724000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029a2980 a2=fc6 a3=0 items=0 ppid=1808 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c577,c584 key=(null) Jul 2 11:36:28.724000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:36:30.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.62.206:22-147.75.109.163:58268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:30.945300 systemd[1]: Started sshd@19-10.230.62.206:22-147.75.109.163:58268.service. Jul 2 11:36:30.948866 kernel: kauditd_printk_skb: 22 callbacks suppressed Jul 2 11:36:30.948998 kernel: audit: type=1130 audit(1719920190.944:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.62.206:22-147.75.109.163:58268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:31.862389 sshd[4952]: Accepted publickey for core from 147.75.109.163 port 58268 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:31.861000 audit[4952]: USER_ACCT pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:31.871718 kernel: audit: type=1101 audit(1719920191.861:1442): pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:31.871000 audit[4952]: CRED_ACQ pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:31.874445 sshd[4952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:31.880029 kernel: audit: type=1103 audit(1719920191.871:1443): pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:31.880139 kernel: audit: type=1006 audit(1719920191.871:1444): pid=4952 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Jul 2 11:36:31.871000 audit[4952]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1cec710 a2=3 a3=0 items=0 ppid=1 pid=4952 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:31.891028 kernel: audit: type=1300 audit(1719920191.871:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1cec710 a2=3 a3=0 items=0 ppid=1 pid=4952 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:31.871000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:31.894101 kernel: audit: type=1327 audit(1719920191.871:1444): proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:31.899075 systemd-logind[1186]: New session 20 of user core. Jul 2 11:36:31.900553 systemd[1]: Started session-20.scope. Jul 2 11:36:31.908000 audit[4952]: USER_START pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:31.916779 kernel: audit: type=1105 audit(1719920191.908:1445): pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:31.916000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:31.924697 kernel: audit: type=1103 audit(1719920191.916:1446): pid=4954 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:32.659191 sshd[4952]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:32.661000 audit[4952]: USER_END pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:32.670698 kernel: audit: type=1106 audit(1719920192.661:1447): pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:32.670909 systemd[1]: sshd@19-10.230.62.206:22-147.75.109.163:58268.service: Deactivated successfully. Jul 2 11:36:32.672140 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 11:36:32.661000 audit[4952]: CRED_DISP pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:32.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.62.206:22-147.75.109.163:58268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:32.679477 systemd-logind[1186]: Session 20 logged out. Waiting for processes to exit. Jul 2 11:36:32.679769 kernel: audit: type=1104 audit(1719920192.661:1448): pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:32.681721 systemd-logind[1186]: Removed session 20. Jul 2 11:36:37.806276 systemd[1]: Started sshd@20-10.230.62.206:22-147.75.109.163:59196.service. Jul 2 11:36:37.817522 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:36:37.817757 kernel: audit: type=1130 audit(1719920197.806:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.62.206:22-147.75.109.163:59196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:37.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.62.206:22-147.75.109.163:59196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:38.695000 audit[4968]: USER_ACCT pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:38.698129 sshd[4968]: Accepted publickey for core from 147.75.109.163 port 59196 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:38.703718 kernel: audit: type=1101 audit(1719920198.695:1451): pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:38.704000 audit[4968]: CRED_ACQ pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:38.730395 sshd[4968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:38.733335 kernel: audit: type=1103 audit(1719920198.704:1452): pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:38.733444 kernel: audit: type=1006 audit(1719920198.704:1453): pid=4968 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jul 2 11:36:38.733915 kernel: audit: type=1300 audit(1719920198.704:1453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5efede90 a2=3 a3=0 items=0 ppid=1 pid=4968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:38.704000 audit[4968]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5efede90 a2=3 a3=0 items=0 ppid=1 pid=4968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:38.704000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:38.745157 kernel: audit: type=1327 audit(1719920198.704:1453): proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:38.750363 systemd-logind[1186]: New session 21 of user core. Jul 2 11:36:38.753322 systemd[1]: Started session-21.scope. Jul 2 11:36:38.761000 audit[4968]: USER_START pid=4968 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:38.771212 kernel: audit: type=1105 audit(1719920198.761:1454): pid=4968 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:38.771334 kernel: audit: type=1103 audit(1719920198.770:1455): pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:38.770000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:39.484623 sshd[4968]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:39.485000 audit[4968]: USER_END pid=4968 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:39.491124 systemd[1]: sshd@20-10.230.62.206:22-147.75.109.163:59196.service: Deactivated successfully. Jul 2 11:36:39.492579 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 11:36:39.497645 kernel: audit: type=1106 audit(1719920199.485:1456): pid=4968 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:39.499325 kernel: audit: type=1104 audit(1719920199.488:1457): pid=4968 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:39.488000 audit[4968]: CRED_DISP pid=4968 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:39.503215 systemd-logind[1186]: Session 21 logged out. Waiting for processes to exit. Jul 2 11:36:39.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.62.206:22-147.75.109.163:59196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:39.504978 systemd-logind[1186]: Removed session 21. Jul 2 11:36:40.694656 systemd[1]: run-containerd-runc-k8s.io-f328d6cf362624537894aeee443645d1361bebfbdee3165c4caa0e0bcfc20d39-runc.NPzisS.mount: Deactivated successfully. Jul 2 11:36:44.638852 systemd[1]: Started sshd@21-10.230.62.206:22-147.75.109.163:52640.service. Jul 2 11:36:44.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.62.206:22-147.75.109.163:52640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:44.642107 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:36:44.642909 kernel: audit: type=1130 audit(1719920204.639:1459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.62.206:22-147.75.109.163:52640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:36:45.568000 audit[5003]: USER_ACCT pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:45.572228 sshd[5003]: Accepted publickey for core from 147.75.109.163 port 52640 ssh2: RSA SHA256:tplVoPuf7nNE4yvFHu+9Y9e9LG8fTMx2zzRxkTkSEBg Jul 2 11:36:45.576000 audit[5003]: CRED_ACQ pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:45.578573 sshd[5003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:36:45.590348 kernel: audit: type=1101 audit(1719920205.568:1460): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:45.590462 kernel: audit: type=1103 audit(1719920205.576:1461): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:45.590528 kernel: audit: type=1006 audit(1719920205.576:1462): pid=5003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 11:36:45.590583 kernel: audit: type=1300 audit(1719920205.576:1462): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcde7067c0 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:45.576000 audit[5003]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcde7067c0 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:36:45.587655 systemd[1]: Started session-22.scope. Jul 2 11:36:45.589708 systemd-logind[1186]: New session 22 of user core. Jul 2 11:36:45.576000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:45.597776 kernel: audit: type=1327 audit(1719920205.576:1462): proctitle=737368643A20636F7265205B707269765D Jul 2 11:36:45.599000 audit[5003]: USER_START pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:45.605000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:45.615560 kernel: audit: type=1105 audit(1719920205.599:1463): pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:45.615652 kernel: audit: type=1103 audit(1719920205.605:1464): pid=5005 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:46.414975 sshd[5003]: pam_unix(sshd:session): session closed for user core Jul 2 11:36:46.415000 audit[5003]: USER_END pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:46.420286 systemd[1]: sshd@21-10.230.62.206:22-147.75.109.163:52640.service: Deactivated successfully. Jul 2 11:36:46.421295 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 11:36:46.422757 systemd-logind[1186]: Session 22 logged out. Waiting for processes to exit. Jul 2 11:36:46.424571 systemd-logind[1186]: Removed session 22. Jul 2 11:36:46.428721 kernel: audit: type=1106 audit(1719920206.415:1465): pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:46.428839 kernel: audit: type=1104 audit(1719920206.415:1466): pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:46.415000 audit[5003]: CRED_DISP pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 11:36:46.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.62.206:22-147.75.109.163:52640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'