Jul 2 08:21:45.558877 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Jul 2 08:21:45.558889 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 08:21:45.558896 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:21:45.558900 kernel: BIOS-provided physical RAM map: Jul 2 08:21:45.558904 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Jul 2 08:21:45.558907 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Jul 2 08:21:45.558912 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Jul 2 08:21:45.558916 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Jul 2 08:21:45.558920 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Jul 2 08:21:45.558924 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000061f6efff] usable Jul 2 08:21:45.558928 kernel: BIOS-e820: [mem 0x0000000061f6f000-0x0000000061f6ffff] ACPI NVS Jul 2 08:21:45.558932 kernel: BIOS-e820: [mem 0x0000000061f70000-0x0000000061f70fff] reserved Jul 2 08:21:45.558936 kernel: BIOS-e820: [mem 0x0000000061f71000-0x000000006c0c4fff] usable Jul 2 08:21:45.558939 kernel: BIOS-e820: [mem 0x000000006c0c5000-0x000000006d1a7fff] reserved Jul 2 08:21:45.558944 kernel: BIOS-e820: [mem 0x000000006d1a8000-0x000000006d330fff] usable Jul 2 08:21:45.558949 kernel: BIOS-e820: [mem 0x000000006d331000-0x000000006d762fff] ACPI NVS Jul 2 08:21:45.558953 kernel: BIOS-e820: [mem 0x000000006d763000-0x000000006fffefff] reserved Jul 2 08:21:45.558957 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Jul 2 08:21:45.558962 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Jul 2 08:21:45.558966 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Jul 2 08:21:45.558970 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Jul 2 08:21:45.558974 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Jul 2 08:21:45.558978 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Jul 2 08:21:45.558982 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Jul 2 08:21:45.558986 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Jul 2 08:21:45.558991 kernel: NX (Execute Disable) protection: active Jul 2 08:21:45.558995 kernel: SMBIOS 3.2.1 present. Jul 2 08:21:45.558999 kernel: DMI: Supermicro X11SCH-F/X11SCH-F, BIOS 1.5 11/17/2020 Jul 2 08:21:45.559003 kernel: tsc: Detected 3400.000 MHz processor Jul 2 08:21:45.559007 kernel: tsc: Detected 3399.906 MHz TSC Jul 2 08:21:45.559011 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 08:21:45.559016 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 08:21:45.559021 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Jul 2 08:21:45.559025 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 08:21:45.559029 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Jul 2 08:21:45.559033 kernel: Using GB pages for direct mapping Jul 2 08:21:45.559038 kernel: ACPI: Early table checksum verification disabled Jul 2 08:21:45.559043 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Jul 2 08:21:45.559047 kernel: ACPI: XSDT 0x000000006D6440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Jul 2 08:21:45.559051 kernel: ACPI: FACP 0x000000006D680620 000114 (v06 01072009 AMI 00010013) Jul 2 08:21:45.559058 kernel: ACPI: DSDT 0x000000006D644268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Jul 2 08:21:45.559062 kernel: ACPI: FACS 0x000000006D762F80 000040 Jul 2 08:21:45.559068 kernel: ACPI: APIC 0x000000006D680738 00012C (v04 01072009 AMI 00010013) Jul 2 08:21:45.559072 kernel: ACPI: FPDT 0x000000006D680868 000044 (v01 01072009 AMI 00010013) Jul 2 08:21:45.559077 kernel: ACPI: FIDT 0x000000006D6808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Jul 2 08:21:45.559082 kernel: ACPI: MCFG 0x000000006D680950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Jul 2 08:21:45.559086 kernel: ACPI: SPMI 0x000000006D680990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Jul 2 08:21:45.559091 kernel: ACPI: SSDT 0x000000006D6809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Jul 2 08:21:45.559095 kernel: ACPI: SSDT 0x000000006D6824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Jul 2 08:21:45.559101 kernel: ACPI: SSDT 0x000000006D6856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Jul 2 08:21:45.559106 kernel: ACPI: HPET 0x000000006D6879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 08:21:45.559110 kernel: ACPI: SSDT 0x000000006D687A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Jul 2 08:21:45.559115 kernel: ACPI: SSDT 0x000000006D6889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Jul 2 08:21:45.559119 kernel: ACPI: UEFI 0x000000006D6892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 08:21:45.559124 kernel: ACPI: LPIT 0x000000006D689318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 08:21:45.559129 kernel: ACPI: SSDT 0x000000006D6893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Jul 2 08:21:45.559133 kernel: ACPI: SSDT 0x000000006D68BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Jul 2 08:21:45.559138 kernel: ACPI: DBGP 0x000000006D68D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 08:21:45.559143 kernel: ACPI: DBG2 0x000000006D68D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Jul 2 08:21:45.559148 kernel: ACPI: SSDT 0x000000006D68D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Jul 2 08:21:45.559152 kernel: ACPI: DMAR 0x000000006D68EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Jul 2 08:21:45.559157 kernel: ACPI: SSDT 0x000000006D68ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Jul 2 08:21:45.559162 kernel: ACPI: TPM2 0x000000006D68EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Jul 2 08:21:45.559166 kernel: ACPI: SSDT 0x000000006D68EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Jul 2 08:21:45.559171 kernel: ACPI: WSMT 0x000000006D68FC28 000028 (v01 \xf0a 01072009 AMI 00010013) Jul 2 08:21:45.559176 kernel: ACPI: EINJ 0x000000006D68FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Jul 2 08:21:45.559181 kernel: ACPI: ERST 0x000000006D68FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Jul 2 08:21:45.559186 kernel: ACPI: BERT 0x000000006D68FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Jul 2 08:21:45.559191 kernel: ACPI: HEST 0x000000006D68FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Jul 2 08:21:45.559195 kernel: ACPI: SSDT 0x000000006D690260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Jul 2 08:21:45.559200 kernel: ACPI: Reserving FACP table memory at [mem 0x6d680620-0x6d680733] Jul 2 08:21:45.559205 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d644268-0x6d68061e] Jul 2 08:21:45.559209 kernel: ACPI: Reserving FACS table memory at [mem 0x6d762f80-0x6d762fbf] Jul 2 08:21:45.559214 kernel: ACPI: Reserving APIC table memory at [mem 0x6d680738-0x6d680863] Jul 2 08:21:45.559218 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d680868-0x6d6808ab] Jul 2 08:21:45.559224 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6808b0-0x6d68094b] Jul 2 08:21:45.559228 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d680950-0x6d68098b] Jul 2 08:21:45.559233 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d680990-0x6d6809d0] Jul 2 08:21:45.559237 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6809d8-0x6d6824f3] Jul 2 08:21:45.559242 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6824f8-0x6d6856bd] Jul 2 08:21:45.559247 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6856c0-0x6d6879ea] Jul 2 08:21:45.559251 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6879f0-0x6d687a27] Jul 2 08:21:45.559256 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d687a28-0x6d6889d5] Jul 2 08:21:45.559260 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6889d8-0x6d6892ce] Jul 2 08:21:45.559265 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d6892d0-0x6d689311] Jul 2 08:21:45.559270 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d689318-0x6d6893ab] Jul 2 08:21:45.559275 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6893b0-0x6d68bb8d] Jul 2 08:21:45.559279 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68bb90-0x6d68d071] Jul 2 08:21:45.559284 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68d078-0x6d68d0ab] Jul 2 08:21:45.559288 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68d0b0-0x6d68d103] Jul 2 08:21:45.559293 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68d108-0x6d68ec6e] Jul 2 08:21:45.559298 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d68ec70-0x6d68ed17] Jul 2 08:21:45.559302 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ed18-0x6d68ee5b] Jul 2 08:21:45.559308 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d68ee60-0x6d68ee93] Jul 2 08:21:45.559312 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ee98-0x6d68fc26] Jul 2 08:21:45.559317 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d68fc28-0x6d68fc4f] Jul 2 08:21:45.559321 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d68fc50-0x6d68fd7f] Jul 2 08:21:45.559326 kernel: ACPI: Reserving ERST table memory at [mem 0x6d68fd80-0x6d68ffaf] Jul 2 08:21:45.559330 kernel: ACPI: Reserving BERT table memory at [mem 0x6d68ffb0-0x6d68ffdf] Jul 2 08:21:45.559335 kernel: ACPI: Reserving HEST table memory at [mem 0x6d68ffe0-0x6d69025b] Jul 2 08:21:45.559340 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690260-0x6d6903c1] Jul 2 08:21:45.559344 kernel: No NUMA configuration found Jul 2 08:21:45.559350 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Jul 2 08:21:45.559354 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Jul 2 08:21:45.559359 kernel: Zone ranges: Jul 2 08:21:45.559364 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 08:21:45.559368 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 08:21:45.559373 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Jul 2 08:21:45.559377 kernel: Movable zone start for each node Jul 2 08:21:45.559382 kernel: Early memory node ranges Jul 2 08:21:45.559386 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Jul 2 08:21:45.559391 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Jul 2 08:21:45.559396 kernel: node 0: [mem 0x0000000040400000-0x0000000061f6efff] Jul 2 08:21:45.559401 kernel: node 0: [mem 0x0000000061f71000-0x000000006c0c4fff] Jul 2 08:21:45.559405 kernel: node 0: [mem 0x000000006d1a8000-0x000000006d330fff] Jul 2 08:21:45.559410 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Jul 2 08:21:45.559415 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Jul 2 08:21:45.559419 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Jul 2 08:21:45.559428 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 08:21:45.559433 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Jul 2 08:21:45.559438 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Jul 2 08:21:45.559443 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Jul 2 08:21:45.559449 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Jul 2 08:21:45.559454 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Jul 2 08:21:45.559459 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Jul 2 08:21:45.559464 kernel: ACPI: PM-Timer IO Port: 0x1808 Jul 2 08:21:45.559469 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Jul 2 08:21:45.559474 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Jul 2 08:21:45.559479 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Jul 2 08:21:45.559484 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Jul 2 08:21:45.559489 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Jul 2 08:21:45.559494 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Jul 2 08:21:45.559499 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Jul 2 08:21:45.559504 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Jul 2 08:21:45.559509 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Jul 2 08:21:45.559513 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Jul 2 08:21:45.559518 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Jul 2 08:21:45.559524 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Jul 2 08:21:45.559529 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Jul 2 08:21:45.559534 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Jul 2 08:21:45.559539 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Jul 2 08:21:45.559543 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Jul 2 08:21:45.559548 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Jul 2 08:21:45.559553 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 08:21:45.559579 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 08:21:45.559584 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 08:21:45.559590 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 08:21:45.559595 kernel: TSC deadline timer available Jul 2 08:21:45.559613 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Jul 2 08:21:45.559618 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Jul 2 08:21:45.559623 kernel: Booting paravirtualized kernel on bare hardware Jul 2 08:21:45.559628 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 08:21:45.559633 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Jul 2 08:21:45.559638 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Jul 2 08:21:45.559643 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Jul 2 08:21:45.559648 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Jul 2 08:21:45.559653 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190323 Jul 2 08:21:45.559658 kernel: Policy zone: Normal Jul 2 08:21:45.559664 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:21:45.559669 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 08:21:45.559674 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Jul 2 08:21:45.559679 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Jul 2 08:21:45.559684 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 08:21:45.559690 kernel: Memory: 32553612K/33281940K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 728068K reserved, 0K cma-reserved) Jul 2 08:21:45.559695 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Jul 2 08:21:45.559700 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 08:21:45.559705 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 08:21:45.559710 kernel: rcu: Hierarchical RCU implementation. Jul 2 08:21:45.559715 kernel: rcu: RCU event tracing is enabled. Jul 2 08:21:45.559720 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Jul 2 08:21:45.559725 kernel: Rude variant of Tasks RCU enabled. Jul 2 08:21:45.559730 kernel: Tracing variant of Tasks RCU enabled. Jul 2 08:21:45.559735 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 08:21:45.559740 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Jul 2 08:21:45.559745 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Jul 2 08:21:45.559750 kernel: random: crng init done Jul 2 08:21:45.559755 kernel: Console: colour dummy device 80x25 Jul 2 08:21:45.559760 kernel: printk: console [tty0] enabled Jul 2 08:21:45.559765 kernel: printk: console [ttyS1] enabled Jul 2 08:21:45.559770 kernel: ACPI: Core revision 20210730 Jul 2 08:21:45.559775 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Jul 2 08:21:45.559780 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 08:21:45.559785 kernel: DMAR: Host address width 39 Jul 2 08:21:45.559790 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Jul 2 08:21:45.559795 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Jul 2 08:21:45.559800 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Jul 2 08:21:45.559805 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Jul 2 08:21:45.559810 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Jul 2 08:21:45.559815 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Jul 2 08:21:45.559820 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Jul 2 08:21:45.559826 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Jul 2 08:21:45.559830 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Jul 2 08:21:45.559835 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Jul 2 08:21:45.559840 kernel: x2apic enabled Jul 2 08:21:45.559845 kernel: Switched APIC routing to cluster x2apic. Jul 2 08:21:45.559850 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 2 08:21:45.559855 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Jul 2 08:21:45.559860 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Jul 2 08:21:45.559865 kernel: CPU0: Thermal monitoring enabled (TM1) Jul 2 08:21:45.559871 kernel: process: using mwait in idle threads Jul 2 08:21:45.559876 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 2 08:21:45.559881 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jul 2 08:21:45.559885 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 08:21:45.559891 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Jul 2 08:21:45.559896 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 2 08:21:45.559901 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 2 08:21:45.559905 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Jul 2 08:21:45.559910 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 08:21:45.559916 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Jul 2 08:21:45.559921 kernel: RETBleed: Mitigation: Enhanced IBRS Jul 2 08:21:45.559926 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 08:21:45.559931 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 08:21:45.559936 kernel: TAA: Mitigation: TSX disabled Jul 2 08:21:45.559941 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Jul 2 08:21:45.559946 kernel: SRBDS: Mitigation: Microcode Jul 2 08:21:45.559951 kernel: GDS: Vulnerable: No microcode Jul 2 08:21:45.559956 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 08:21:45.559961 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 08:21:45.559966 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 08:21:45.559971 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Jul 2 08:21:45.559976 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Jul 2 08:21:45.559981 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 08:21:45.559986 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Jul 2 08:21:45.559991 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Jul 2 08:21:45.559996 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Jul 2 08:21:45.560001 kernel: Freeing SMP alternatives memory: 32K Jul 2 08:21:45.560006 kernel: pid_max: default: 32768 minimum: 301 Jul 2 08:21:45.560011 kernel: LSM: Security Framework initializing Jul 2 08:21:45.560016 kernel: SELinux: Initializing. Jul 2 08:21:45.560021 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 08:21:45.560026 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 08:21:45.560031 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Jul 2 08:21:45.560036 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Jul 2 08:21:45.560041 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Jul 2 08:21:45.560047 kernel: ... version: 4 Jul 2 08:21:45.560052 kernel: ... bit width: 48 Jul 2 08:21:45.560057 kernel: ... generic registers: 4 Jul 2 08:21:45.560062 kernel: ... value mask: 0000ffffffffffff Jul 2 08:21:45.560067 kernel: ... max period: 00007fffffffffff Jul 2 08:21:45.560072 kernel: ... fixed-purpose events: 3 Jul 2 08:21:45.560077 kernel: ... event mask: 000000070000000f Jul 2 08:21:45.560082 kernel: signal: max sigframe size: 2032 Jul 2 08:21:45.560087 kernel: rcu: Hierarchical SRCU implementation. Jul 2 08:21:45.560092 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Jul 2 08:21:45.560097 kernel: smp: Bringing up secondary CPUs ... Jul 2 08:21:45.560102 kernel: x86: Booting SMP configuration: Jul 2 08:21:45.560107 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Jul 2 08:21:45.560112 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 08:21:45.560117 kernel: #9 #10 #11 #12 #13 #14 #15 Jul 2 08:21:45.560122 kernel: smp: Brought up 1 node, 16 CPUs Jul 2 08:21:45.560127 kernel: smpboot: Max logical packages: 1 Jul 2 08:21:45.560132 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Jul 2 08:21:45.560138 kernel: devtmpfs: initialized Jul 2 08:21:45.560143 kernel: x86/mm: Memory block size: 128MB Jul 2 08:21:45.560148 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x61f6f000-0x61f6ffff] (4096 bytes) Jul 2 08:21:45.560152 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d331000-0x6d762fff] (4399104 bytes) Jul 2 08:21:45.560157 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 08:21:45.560162 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Jul 2 08:21:45.560167 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 08:21:45.560172 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 08:21:45.560177 kernel: audit: initializing netlink subsys (disabled) Jul 2 08:21:45.560183 kernel: audit: type=2000 audit(1719908499.114:1): state=initialized audit_enabled=0 res=1 Jul 2 08:21:45.560188 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 08:21:45.560192 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 08:21:45.560197 kernel: cpuidle: using governor menu Jul 2 08:21:45.560202 kernel: ACPI: bus type PCI registered Jul 2 08:21:45.560207 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 08:21:45.560212 kernel: dca service started, version 1.12.1 Jul 2 08:21:45.560217 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Jul 2 08:21:45.560222 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Jul 2 08:21:45.560228 kernel: PCI: Using configuration type 1 for base access Jul 2 08:21:45.560233 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Jul 2 08:21:45.560237 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 08:21:45.560242 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 08:21:45.560247 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 08:21:45.560252 kernel: ACPI: Added _OSI(Module Device) Jul 2 08:21:45.560257 kernel: ACPI: Added _OSI(Processor Device) Jul 2 08:21:45.560262 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 08:21:45.560267 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 08:21:45.560273 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 08:21:45.560278 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 08:21:45.560283 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 08:21:45.560288 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Jul 2 08:21:45.560293 kernel: ACPI: Dynamic OEM Table Load: Jul 2 08:21:45.560297 kernel: ACPI: SSDT 0xFFFF9FD300223400 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Jul 2 08:21:45.560302 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Jul 2 08:21:45.560307 kernel: ACPI: Dynamic OEM Table Load: Jul 2 08:21:45.560312 kernel: ACPI: SSDT 0xFFFF9FD301CF5000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Jul 2 08:21:45.560318 kernel: ACPI: Dynamic OEM Table Load: Jul 2 08:21:45.560323 kernel: ACPI: SSDT 0xFFFF9FD301C61800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Jul 2 08:21:45.560328 kernel: ACPI: Dynamic OEM Table Load: Jul 2 08:21:45.560332 kernel: ACPI: SSDT 0xFFFF9FD301D57800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Jul 2 08:21:45.560337 kernel: ACPI: Dynamic OEM Table Load: Jul 2 08:21:45.560342 kernel: ACPI: SSDT 0xFFFF9FD300156000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Jul 2 08:21:45.560347 kernel: ACPI: Dynamic OEM Table Load: Jul 2 08:21:45.560352 kernel: ACPI: SSDT 0xFFFF9FD301CF7C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Jul 2 08:21:45.560357 kernel: ACPI: Interpreter enabled Jul 2 08:21:45.560362 kernel: ACPI: PM: (supports S0 S5) Jul 2 08:21:45.560367 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 08:21:45.560372 kernel: HEST: Enabling Firmware First mode for corrected errors. Jul 2 08:21:45.560377 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Jul 2 08:21:45.560382 kernel: HEST: Table parsing has been initialized. Jul 2 08:21:45.560387 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Jul 2 08:21:45.560392 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 08:21:45.560397 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Jul 2 08:21:45.560402 kernel: ACPI: PM: Power Resource [USBC] Jul 2 08:21:45.560407 kernel: ACPI: PM: Power Resource [V0PR] Jul 2 08:21:45.560412 kernel: ACPI: PM: Power Resource [V1PR] Jul 2 08:21:45.560417 kernel: ACPI: PM: Power Resource [V2PR] Jul 2 08:21:45.560422 kernel: ACPI: PM: Power Resource [WRST] Jul 2 08:21:45.560427 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Jul 2 08:21:45.560432 kernel: ACPI: PM: Power Resource [FN00] Jul 2 08:21:45.560437 kernel: ACPI: PM: Power Resource [FN01] Jul 2 08:21:45.560441 kernel: ACPI: PM: Power Resource [FN02] Jul 2 08:21:45.560446 kernel: ACPI: PM: Power Resource [FN03] Jul 2 08:21:45.560451 kernel: ACPI: PM: Power Resource [FN04] Jul 2 08:21:45.560457 kernel: ACPI: PM: Power Resource [PIN] Jul 2 08:21:45.560462 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Jul 2 08:21:45.560527 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 08:21:45.560593 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Jul 2 08:21:45.560650 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Jul 2 08:21:45.560657 kernel: PCI host bridge to bus 0000:00 Jul 2 08:21:45.560704 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 08:21:45.560745 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 08:21:45.560782 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 08:21:45.560819 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Jul 2 08:21:45.560858 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Jul 2 08:21:45.560895 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Jul 2 08:21:45.560945 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Jul 2 08:21:45.560994 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Jul 2 08:21:45.561039 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.561088 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Jul 2 08:21:45.561131 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.561177 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Jul 2 08:21:45.561221 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Jul 2 08:21:45.561264 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Jul 2 08:21:45.561307 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Jul 2 08:21:45.561357 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Jul 2 08:21:45.561400 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Jul 2 08:21:45.561446 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Jul 2 08:21:45.561488 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Jul 2 08:21:45.561535 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Jul 2 08:21:45.561614 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Jul 2 08:21:45.561657 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Jul 2 08:21:45.561703 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Jul 2 08:21:45.561744 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Jul 2 08:21:45.561786 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Jul 2 08:21:45.561831 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Jul 2 08:21:45.561874 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 08:21:45.561920 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Jul 2 08:21:45.561962 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 08:21:45.562012 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Jul 2 08:21:45.562061 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Jul 2 08:21:45.562104 kernel: pci 0000:00:16.0: PME# supported from D3hot Jul 2 08:21:45.562149 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Jul 2 08:21:45.562193 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Jul 2 08:21:45.562234 kernel: pci 0000:00:16.1: PME# supported from D3hot Jul 2 08:21:45.562280 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Jul 2 08:21:45.562321 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Jul 2 08:21:45.562364 kernel: pci 0000:00:16.4: PME# supported from D3hot Jul 2 08:21:45.562409 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Jul 2 08:21:45.562451 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Jul 2 08:21:45.562494 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Jul 2 08:21:45.562537 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Jul 2 08:21:45.562616 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Jul 2 08:21:45.562657 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Jul 2 08:21:45.562699 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Jul 2 08:21:45.562740 kernel: pci 0000:00:17.0: PME# supported from D3hot Jul 2 08:21:45.562790 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Jul 2 08:21:45.562832 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.562879 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Jul 2 08:21:45.562922 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.562972 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Jul 2 08:21:45.563015 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.563061 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Jul 2 08:21:45.563104 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.563150 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Jul 2 08:21:45.563192 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.563240 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Jul 2 08:21:45.563282 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 08:21:45.563329 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Jul 2 08:21:45.563374 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Jul 2 08:21:45.563417 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Jul 2 08:21:45.563458 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Jul 2 08:21:45.563506 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Jul 2 08:21:45.563549 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Jul 2 08:21:45.563637 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 2 08:21:45.563685 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Jul 2 08:21:45.563729 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Jul 2 08:21:45.563773 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Jul 2 08:21:45.563817 kernel: pci 0000:02:00.0: PME# supported from D3cold Jul 2 08:21:45.563861 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jul 2 08:21:45.563907 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jul 2 08:21:45.563956 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Jul 2 08:21:45.564000 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Jul 2 08:21:45.564045 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Jul 2 08:21:45.564088 kernel: pci 0000:02:00.1: PME# supported from D3cold Jul 2 08:21:45.564131 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jul 2 08:21:45.564174 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jul 2 08:21:45.564218 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Jul 2 08:21:45.564263 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Jul 2 08:21:45.564339 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 08:21:45.564400 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Jul 2 08:21:45.564447 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Jul 2 08:21:45.564492 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Jul 2 08:21:45.564535 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Jul 2 08:21:45.564622 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Jul 2 08:21:45.564665 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Jul 2 08:21:45.564710 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.564752 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Jul 2 08:21:45.564794 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jul 2 08:21:45.564836 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Jul 2 08:21:45.564883 kernel: pci 0000:05:00.0: working around ROM BAR overlap defect Jul 2 08:21:45.564930 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Jul 2 08:21:45.564973 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Jul 2 08:21:45.565016 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Jul 2 08:21:45.565059 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Jul 2 08:21:45.565102 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Jul 2 08:21:45.565145 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Jul 2 08:21:45.565187 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jul 2 08:21:45.565228 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Jul 2 08:21:45.565273 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Jul 2 08:21:45.565323 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Jul 2 08:21:45.565366 kernel: pci 0000:07:00.0: enabling Extended Tags Jul 2 08:21:45.565410 kernel: pci 0000:07:00.0: supports D1 D2 Jul 2 08:21:45.565454 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 08:21:45.565496 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Jul 2 08:21:45.565538 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Jul 2 08:21:45.565626 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Jul 2 08:21:45.565675 kernel: pci_bus 0000:08: extended config space not accessible Jul 2 08:21:45.565726 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Jul 2 08:21:45.565772 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Jul 2 08:21:45.565819 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Jul 2 08:21:45.565865 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Jul 2 08:21:45.565912 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 08:21:45.565959 kernel: pci 0000:08:00.0: supports D1 D2 Jul 2 08:21:45.566005 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 08:21:45.566049 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Jul 2 08:21:45.566093 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Jul 2 08:21:45.566137 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Jul 2 08:21:45.566145 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Jul 2 08:21:45.566151 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Jul 2 08:21:45.566156 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Jul 2 08:21:45.566163 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Jul 2 08:21:45.566168 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Jul 2 08:21:45.566173 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Jul 2 08:21:45.566179 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Jul 2 08:21:45.566184 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Jul 2 08:21:45.566189 kernel: iommu: Default domain type: Translated Jul 2 08:21:45.566194 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 08:21:45.566240 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Jul 2 08:21:45.566286 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 08:21:45.566335 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Jul 2 08:21:45.566342 kernel: vgaarb: loaded Jul 2 08:21:45.566348 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 08:21:45.566353 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 08:21:45.566358 kernel: PTP clock support registered Jul 2 08:21:45.566364 kernel: PCI: Using ACPI for IRQ routing Jul 2 08:21:45.566369 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 08:21:45.566374 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Jul 2 08:21:45.566380 kernel: e820: reserve RAM buffer [mem 0x61f6f000-0x63ffffff] Jul 2 08:21:45.566386 kernel: e820: reserve RAM buffer [mem 0x6c0c5000-0x6fffffff] Jul 2 08:21:45.566391 kernel: e820: reserve RAM buffer [mem 0x6d331000-0x6fffffff] Jul 2 08:21:45.566396 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Jul 2 08:21:45.566402 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Jul 2 08:21:45.566407 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Jul 2 08:21:45.566412 kernel: clocksource: Switched to clocksource tsc-early Jul 2 08:21:45.566418 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 08:21:45.566424 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 08:21:45.566429 kernel: pnp: PnP ACPI init Jul 2 08:21:45.566473 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Jul 2 08:21:45.566517 kernel: pnp 00:02: [dma 0 disabled] Jul 2 08:21:45.566581 kernel: pnp 00:03: [dma 0 disabled] Jul 2 08:21:45.566643 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Jul 2 08:21:45.566682 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Jul 2 08:21:45.566725 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Jul 2 08:21:45.566770 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Jul 2 08:21:45.566809 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Jul 2 08:21:45.566847 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Jul 2 08:21:45.566885 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Jul 2 08:21:45.566923 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Jul 2 08:21:45.566962 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Jul 2 08:21:45.567002 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Jul 2 08:21:45.567042 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Jul 2 08:21:45.567083 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Jul 2 08:21:45.567123 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Jul 2 08:21:45.567160 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Jul 2 08:21:45.567198 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Jul 2 08:21:45.567237 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Jul 2 08:21:45.567274 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Jul 2 08:21:45.567314 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Jul 2 08:21:45.567356 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Jul 2 08:21:45.567363 kernel: pnp: PnP ACPI: found 10 devices Jul 2 08:21:45.567369 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 08:21:45.567375 kernel: NET: Registered PF_INET protocol family Jul 2 08:21:45.567380 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 08:21:45.567385 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 08:21:45.567392 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 08:21:45.567397 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 08:21:45.567403 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 08:21:45.567408 kernel: TCP: Hash tables configured (established 262144 bind 65536) Jul 2 08:21:45.567413 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Jul 2 08:21:45.567419 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Jul 2 08:21:45.567424 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 08:21:45.567429 kernel: NET: Registered PF_XDP protocol family Jul 2 08:21:45.567473 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Jul 2 08:21:45.567518 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Jul 2 08:21:45.567585 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Jul 2 08:21:45.567644 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 2 08:21:45.567688 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Jul 2 08:21:45.567732 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jul 2 08:21:45.567777 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Jul 2 08:21:45.567822 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jul 2 08:21:45.567864 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Jul 2 08:21:45.567907 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Jul 2 08:21:45.567950 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 08:21:45.567993 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Jul 2 08:21:45.568036 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Jul 2 08:21:45.568078 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jul 2 08:21:45.568123 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Jul 2 08:21:45.568166 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Jul 2 08:21:45.568209 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jul 2 08:21:45.568252 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Jul 2 08:21:45.568294 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Jul 2 08:21:45.568338 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Jul 2 08:21:45.568383 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Jul 2 08:21:45.568426 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Jul 2 08:21:45.568468 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Jul 2 08:21:45.568514 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Jul 2 08:21:45.568557 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Jul 2 08:21:45.568638 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Jul 2 08:21:45.568676 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 08:21:45.568714 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 08:21:45.568751 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 08:21:45.568788 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Jul 2 08:21:45.568825 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Jul 2 08:21:45.568871 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Jul 2 08:21:45.568912 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 08:21:45.568955 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Jul 2 08:21:45.568995 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Jul 2 08:21:45.569040 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Jul 2 08:21:45.569079 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Jul 2 08:21:45.569124 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Jul 2 08:21:45.569163 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Jul 2 08:21:45.569206 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Jul 2 08:21:45.569247 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Jul 2 08:21:45.569254 kernel: PCI: CLS 64 bytes, default 64 Jul 2 08:21:45.569260 kernel: DMAR: No ATSR found Jul 2 08:21:45.569265 kernel: DMAR: No SATC found Jul 2 08:21:45.569271 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Jul 2 08:21:45.569277 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Jul 2 08:21:45.569283 kernel: DMAR: IOMMU feature nwfs inconsistent Jul 2 08:21:45.569288 kernel: DMAR: IOMMU feature pasid inconsistent Jul 2 08:21:45.569293 kernel: DMAR: IOMMU feature eafs inconsistent Jul 2 08:21:45.569299 kernel: DMAR: IOMMU feature prs inconsistent Jul 2 08:21:45.569304 kernel: DMAR: IOMMU feature nest inconsistent Jul 2 08:21:45.569309 kernel: DMAR: IOMMU feature mts inconsistent Jul 2 08:21:45.569314 kernel: DMAR: IOMMU feature sc_support inconsistent Jul 2 08:21:45.569320 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Jul 2 08:21:45.569326 kernel: DMAR: dmar0: Using Queued invalidation Jul 2 08:21:45.569331 kernel: DMAR: dmar1: Using Queued invalidation Jul 2 08:21:45.569375 kernel: pci 0000:00:00.0: Adding to iommu group 0 Jul 2 08:21:45.569418 kernel: pci 0000:00:01.0: Adding to iommu group 1 Jul 2 08:21:45.569462 kernel: pci 0000:00:01.1: Adding to iommu group 1 Jul 2 08:21:45.569503 kernel: pci 0000:00:02.0: Adding to iommu group 2 Jul 2 08:21:45.569546 kernel: pci 0000:00:08.0: Adding to iommu group 3 Jul 2 08:21:45.569634 kernel: pci 0000:00:12.0: Adding to iommu group 4 Jul 2 08:21:45.569677 kernel: pci 0000:00:14.0: Adding to iommu group 5 Jul 2 08:21:45.569720 kernel: pci 0000:00:14.2: Adding to iommu group 5 Jul 2 08:21:45.569762 kernel: pci 0000:00:15.0: Adding to iommu group 6 Jul 2 08:21:45.569805 kernel: pci 0000:00:15.1: Adding to iommu group 6 Jul 2 08:21:45.569846 kernel: pci 0000:00:16.0: Adding to iommu group 7 Jul 2 08:21:45.569888 kernel: pci 0000:00:16.1: Adding to iommu group 7 Jul 2 08:21:45.569931 kernel: pci 0000:00:16.4: Adding to iommu group 7 Jul 2 08:21:45.569972 kernel: pci 0000:00:17.0: Adding to iommu group 8 Jul 2 08:21:45.570017 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Jul 2 08:21:45.570060 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Jul 2 08:21:45.570102 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Jul 2 08:21:45.570145 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Jul 2 08:21:45.570187 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Jul 2 08:21:45.570228 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Jul 2 08:21:45.570271 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Jul 2 08:21:45.570314 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Jul 2 08:21:45.570358 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Jul 2 08:21:45.570402 kernel: pci 0000:02:00.0: Adding to iommu group 1 Jul 2 08:21:45.570445 kernel: pci 0000:02:00.1: Adding to iommu group 1 Jul 2 08:21:45.570491 kernel: pci 0000:04:00.0: Adding to iommu group 16 Jul 2 08:21:45.570534 kernel: pci 0000:05:00.0: Adding to iommu group 17 Jul 2 08:21:45.570617 kernel: pci 0000:07:00.0: Adding to iommu group 18 Jul 2 08:21:45.570663 kernel: pci 0000:08:00.0: Adding to iommu group 18 Jul 2 08:21:45.570670 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Jul 2 08:21:45.570676 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 08:21:45.570683 kernel: software IO TLB: mapped [mem 0x00000000680c5000-0x000000006c0c5000] (64MB) Jul 2 08:21:45.570688 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Jul 2 08:21:45.570694 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Jul 2 08:21:45.570699 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Jul 2 08:21:45.570704 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Jul 2 08:21:45.570709 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Jul 2 08:21:45.570755 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Jul 2 08:21:45.570763 kernel: Initialise system trusted keyrings Jul 2 08:21:45.570770 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Jul 2 08:21:45.570775 kernel: Key type asymmetric registered Jul 2 08:21:45.570780 kernel: Asymmetric key parser 'x509' registered Jul 2 08:21:45.570786 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 08:21:45.570791 kernel: io scheduler mq-deadline registered Jul 2 08:21:45.570796 kernel: io scheduler kyber registered Jul 2 08:21:45.570801 kernel: io scheduler bfq registered Jul 2 08:21:45.570844 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Jul 2 08:21:45.570887 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Jul 2 08:21:45.570932 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Jul 2 08:21:45.570974 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Jul 2 08:21:45.571017 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Jul 2 08:21:45.571059 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Jul 2 08:21:45.571101 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Jul 2 08:21:45.571147 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Jul 2 08:21:45.571155 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Jul 2 08:21:45.571162 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Jul 2 08:21:45.571167 kernel: pstore: Registered erst as persistent store backend Jul 2 08:21:45.571173 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 08:21:45.571178 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 08:21:45.571183 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 08:21:45.571189 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 08:21:45.571233 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Jul 2 08:21:45.571241 kernel: i8042: PNP: No PS/2 controller found. Jul 2 08:21:45.571281 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Jul 2 08:21:45.571320 kernel: rtc_cmos rtc_cmos: registered as rtc0 Jul 2 08:21:45.571360 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-07-02T08:21:44 UTC (1719908504) Jul 2 08:21:45.571398 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Jul 2 08:21:45.571405 kernel: fail to initialize ptp_kvm Jul 2 08:21:45.571411 kernel: intel_pstate: Intel P-state driver initializing Jul 2 08:21:45.571416 kernel: intel_pstate: Disabling energy efficiency optimization Jul 2 08:21:45.571421 kernel: intel_pstate: HWP enabled Jul 2 08:21:45.571428 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Jul 2 08:21:45.571433 kernel: vesafb: scrolling: redraw Jul 2 08:21:45.571439 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Jul 2 08:21:45.571444 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x000000002d1f5379, using 768k, total 768k Jul 2 08:21:45.571449 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 08:21:45.571455 kernel: fb0: VESA VGA frame buffer device Jul 2 08:21:45.571460 kernel: NET: Registered PF_INET6 protocol family Jul 2 08:21:45.571465 kernel: Segment Routing with IPv6 Jul 2 08:21:45.571470 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 08:21:45.571477 kernel: NET: Registered PF_PACKET protocol family Jul 2 08:21:45.571482 kernel: Key type dns_resolver registered Jul 2 08:21:45.571487 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Jul 2 08:21:45.571492 kernel: microcode: Microcode Update Driver: v2.2. Jul 2 08:21:45.571498 kernel: IPI shorthand broadcast: enabled Jul 2 08:21:45.571503 kernel: sched_clock: Marking stable (1844304375, 1352953565)->(4643001135, -1445743195) Jul 2 08:21:45.571508 kernel: registered taskstats version 1 Jul 2 08:21:45.571514 kernel: Loading compiled-in X.509 certificates Jul 2 08:21:45.571519 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 08:21:45.571525 kernel: Key type .fscrypt registered Jul 2 08:21:45.571531 kernel: Key type fscrypt-provisioning registered Jul 2 08:21:45.571536 kernel: pstore: Using crash dump compression: deflate Jul 2 08:21:45.571541 kernel: ima: Allocated hash algorithm: sha1 Jul 2 08:21:45.571546 kernel: ima: No architecture policies found Jul 2 08:21:45.571552 kernel: clk: Disabling unused clocks Jul 2 08:21:45.571559 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 08:21:45.571585 kernel: Write protecting the kernel read-only data: 28672k Jul 2 08:21:45.571590 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 08:21:45.571596 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 08:21:45.571621 kernel: Run /init as init process Jul 2 08:21:45.571627 kernel: with arguments: Jul 2 08:21:45.571632 kernel: /init Jul 2 08:21:45.571637 kernel: with environment: Jul 2 08:21:45.571643 kernel: HOME=/ Jul 2 08:21:45.571648 kernel: TERM=linux Jul 2 08:21:45.571653 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 08:21:45.571660 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 08:21:45.571667 systemd[1]: Detected architecture x86-64. Jul 2 08:21:45.571673 systemd[1]: Running in initrd. Jul 2 08:21:45.571678 systemd[1]: No hostname configured, using default hostname. Jul 2 08:21:45.571684 systemd[1]: Hostname set to . Jul 2 08:21:45.571689 systemd[1]: Initializing machine ID from random generator. Jul 2 08:21:45.571695 systemd[1]: Queued start job for default target initrd.target. Jul 2 08:21:45.571700 systemd[1]: Started systemd-ask-password-console.path. Jul 2 08:21:45.571707 systemd[1]: Reached target cryptsetup.target. Jul 2 08:21:45.571712 systemd[1]: Reached target paths.target. Jul 2 08:21:45.571717 systemd[1]: Reached target slices.target. Jul 2 08:21:45.571723 systemd[1]: Reached target swap.target. Jul 2 08:21:45.571728 systemd[1]: Reached target timers.target. Jul 2 08:21:45.571734 systemd[1]: Listening on iscsid.socket. Jul 2 08:21:45.571740 systemd[1]: Listening on iscsiuio.socket. Jul 2 08:21:45.571746 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 08:21:45.571751 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 08:21:45.571757 systemd[1]: Listening on systemd-journald.socket. Jul 2 08:21:45.571762 systemd[1]: Listening on systemd-networkd.socket. Jul 2 08:21:45.571768 kernel: tsc: Refined TSC clocksource calibration: 3408.047 MHz Jul 2 08:21:45.571773 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x31200094248, max_idle_ns: 440795318142 ns Jul 2 08:21:45.571779 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 08:21:45.571784 kernel: clocksource: Switched to clocksource tsc Jul 2 08:21:45.571790 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 08:21:45.571796 systemd[1]: Reached target sockets.target. Jul 2 08:21:45.571802 systemd[1]: Starting kmod-static-nodes.service... Jul 2 08:21:45.571808 systemd[1]: Finished network-cleanup.service. Jul 2 08:21:45.571813 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 08:21:45.571819 systemd[1]: Starting systemd-journald.service... Jul 2 08:21:45.571825 systemd[1]: Starting systemd-modules-load.service... Jul 2 08:21:45.571832 systemd-journald[267]: Journal started Jul 2 08:21:45.571858 systemd-journald[267]: Runtime Journal (/run/log/journal/b19f972ef2644d22b041486816fec010) is 8.0M, max 636.8M, 628.8M free. Jul 2 08:21:45.573119 systemd-modules-load[268]: Inserted module 'overlay' Jul 2 08:21:45.602864 kernel: audit: type=1334 audit(1719908505.579:2): prog-id=6 op=LOAD Jul 2 08:21:45.602874 systemd[1]: Starting systemd-resolved.service... Jul 2 08:21:45.579000 audit: BPF prog-id=6 op=LOAD Jul 2 08:21:45.647613 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 08:21:45.647644 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 08:21:45.680588 kernel: Bridge firewalling registered Jul 2 08:21:45.680604 systemd[1]: Started systemd-journald.service. Jul 2 08:21:45.695204 systemd-modules-load[268]: Inserted module 'br_netfilter' Jul 2 08:21:45.745149 kernel: audit: type=1130 audit(1719908505.703:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.697709 systemd-resolved[270]: Positive Trust Anchors: Jul 2 08:21:45.821519 kernel: SCSI subsystem initialized Jul 2 08:21:45.821531 kernel: audit: type=1130 audit(1719908505.756:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.821539 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 08:21:45.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.697718 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 08:21:45.923684 kernel: device-mapper: uevent: version 1.0.3 Jul 2 08:21:45.923717 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 08:21:45.923728 kernel: audit: type=1130 audit(1719908505.879:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.697738 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 08:21:45.997805 kernel: audit: type=1130 audit(1719908505.932:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.699287 systemd-resolved[270]: Defaulting to hostname 'linux'. Jul 2 08:21:46.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.703784 systemd[1]: Started systemd-resolved.service. Jul 2 08:21:46.106239 kernel: audit: type=1130 audit(1719908506.006:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:46.106252 kernel: audit: type=1130 audit(1719908506.059:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:46.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:45.756747 systemd[1]: Finished kmod-static-nodes.service. Jul 2 08:21:45.879772 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 08:21:45.924300 systemd-modules-load[268]: Inserted module 'dm_multipath' Jul 2 08:21:45.932859 systemd[1]: Finished systemd-modules-load.service. Jul 2 08:21:46.006916 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 08:21:46.059849 systemd[1]: Reached target nss-lookup.target. Jul 2 08:21:46.115156 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 08:21:46.135082 systemd[1]: Starting systemd-sysctl.service... Jul 2 08:21:46.135377 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 08:21:46.138325 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 08:21:46.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:46.139105 systemd[1]: Finished systemd-sysctl.service. Jul 2 08:21:46.187630 kernel: audit: type=1130 audit(1719908506.137:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:46.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:46.200880 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 08:21:46.267640 kernel: audit: type=1130 audit(1719908506.200:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:46.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:46.259167 systemd[1]: Starting dracut-cmdline.service... Jul 2 08:21:46.281692 dracut-cmdline[292]: dracut-dracut-053 Jul 2 08:21:46.281692 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jul 2 08:21:46.281692 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:21:46.361659 kernel: Loading iSCSI transport class v2.0-870. Jul 2 08:21:46.361674 kernel: iscsi: registered transport (tcp) Jul 2 08:21:46.407039 kernel: iscsi: registered transport (qla4xxx) Jul 2 08:21:46.407056 kernel: QLogic iSCSI HBA Driver Jul 2 08:21:46.423049 systemd[1]: Finished dracut-cmdline.service. Jul 2 08:21:46.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:46.432284 systemd[1]: Starting dracut-pre-udev.service... Jul 2 08:21:46.488641 kernel: raid6: avx2x4 gen() 48916 MB/s Jul 2 08:21:46.524640 kernel: raid6: avx2x4 xor() 21298 MB/s Jul 2 08:21:46.560602 kernel: raid6: avx2x2 gen() 52461 MB/s Jul 2 08:21:46.595593 kernel: raid6: avx2x2 xor() 31316 MB/s Jul 2 08:21:46.630597 kernel: raid6: avx2x1 gen() 45190 MB/s Jul 2 08:21:46.665640 kernel: raid6: avx2x1 xor() 27882 MB/s Jul 2 08:21:46.699560 kernel: raid6: sse2x4 gen() 21354 MB/s Jul 2 08:21:46.733637 kernel: raid6: sse2x4 xor() 11994 MB/s Jul 2 08:21:46.767636 kernel: raid6: sse2x2 gen() 21685 MB/s Jul 2 08:21:46.801640 kernel: raid6: sse2x2 xor() 13439 MB/s Jul 2 08:21:46.835598 kernel: raid6: sse2x1 gen() 18249 MB/s Jul 2 08:21:46.887131 kernel: raid6: sse2x1 xor() 8915 MB/s Jul 2 08:21:46.887146 kernel: raid6: using algorithm avx2x2 gen() 52461 MB/s Jul 2 08:21:46.887154 kernel: raid6: .... xor() 31316 MB/s, rmw enabled Jul 2 08:21:46.905157 kernel: raid6: using avx2x2 recovery algorithm Jul 2 08:21:46.951562 kernel: xor: automatically using best checksumming function avx Jul 2 08:21:47.030567 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 08:21:47.034992 systemd[1]: Finished dracut-pre-udev.service. Jul 2 08:21:47.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:47.044000 audit: BPF prog-id=7 op=LOAD Jul 2 08:21:47.044000 audit: BPF prog-id=8 op=LOAD Jul 2 08:21:47.045446 systemd[1]: Starting systemd-udevd.service... Jul 2 08:21:47.053298 systemd-udevd[472]: Using default interface naming scheme 'v252'. Jul 2 08:21:47.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:47.059730 systemd[1]: Started systemd-udevd.service. Jul 2 08:21:47.099682 dracut-pre-trigger[484]: rd.md=0: removing MD RAID activation Jul 2 08:21:47.076193 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 08:21:47.107882 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 08:21:47.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:47.125660 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 08:21:47.213966 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 08:21:47.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:47.243688 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 08:21:47.245564 kernel: libata version 3.00 loaded. Jul 2 08:21:47.245589 kernel: ACPI: bus type USB registered Jul 2 08:21:47.279958 kernel: usbcore: registered new interface driver usbfs Jul 2 08:21:47.280008 kernel: usbcore: registered new interface driver hub Jul 2 08:21:47.314899 kernel: usbcore: registered new device driver usb Jul 2 08:21:47.315561 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 08:21:47.348063 kernel: AES CTR mode by8 optimization enabled Jul 2 08:21:47.348559 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Jul 2 08:21:47.348572 kernel: ahci 0000:00:17.0: version 3.0 Jul 2 08:21:47.382027 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Jul 2 08:21:47.382043 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Jul 2 08:21:47.421379 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Jul 2 08:21:47.453270 kernel: pps pps0: new PPS source ptp0 Jul 2 08:21:47.453409 kernel: igb 0000:04:00.0: added PHC on eth0 Jul 2 08:21:47.453481 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Jul 2 08:21:47.455561 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Jul 2 08:21:47.455657 kernel: scsi host0: ahci Jul 2 08:21:47.455725 kernel: scsi host1: ahci Jul 2 08:21:47.455783 kernel: scsi host2: ahci Jul 2 08:21:47.455836 kernel: scsi host3: ahci Jul 2 08:21:47.455886 kernel: scsi host4: ahci Jul 2 08:21:47.455938 kernel: scsi host5: ahci Jul 2 08:21:47.455990 kernel: scsi host6: ahci Jul 2 08:21:47.457560 kernel: scsi host7: ahci Jul 2 08:21:47.457625 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 129 Jul 2 08:21:47.457634 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 129 Jul 2 08:21:47.457640 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 129 Jul 2 08:21:47.457647 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 129 Jul 2 08:21:47.457655 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 129 Jul 2 08:21:47.457662 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 129 Jul 2 08:21:47.457668 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 129 Jul 2 08:21:47.457674 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 129 Jul 2 08:21:47.470861 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:08:6e Jul 2 08:21:47.487302 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Jul 2 08:21:47.487376 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jul 2 08:21:47.500242 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jul 2 08:21:47.536605 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jul 2 08:21:47.592513 kernel: pps pps1: new PPS source ptp1 Jul 2 08:21:47.592603 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Jul 2 08:21:47.592661 kernel: igb 0000:05:00.0: added PHC on eth1 Jul 2 08:21:47.632985 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Jul 2 08:21:47.633065 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Jul 2 08:21:47.645974 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jul 2 08:21:47.646044 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:08:6f Jul 2 08:21:47.658958 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Jul 2 08:21:47.659030 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Jul 2 08:21:47.672624 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jul 2 08:21:47.771593 kernel: ata3: SATA link down (SStatus 0 SControl 300) Jul 2 08:21:47.771610 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Jul 2 08:21:47.773600 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Jul 2 08:21:47.788561 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jul 2 08:21:47.788576 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 08:21:47.812924 kernel: hub 1-0:1.0: USB hub found Jul 2 08:21:47.813008 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jul 2 08:21:47.825614 kernel: hub 1-0:1.0: 16 ports detected Jul 2 08:21:47.840559 kernel: ata7: SATA link down (SStatus 0 SControl 300) Jul 2 08:21:47.868608 kernel: hub 2-0:1.0: USB hub found Jul 2 08:21:47.868688 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 2 08:21:47.896346 kernel: hub 2-0:1.0: 10 ports detected Jul 2 08:21:47.896434 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Jul 2 08:21:47.998558 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jul 2 08:21:47.998638 kernel: ata8: SATA link down (SStatus 0 SControl 300) Jul 2 08:21:48.025599 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Jul 2 08:21:48.025673 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 2 08:21:48.050927 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jul 2 08:21:48.050998 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 2 08:21:48.119634 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Jul 2 08:21:48.119661 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Jul 2 08:21:48.199559 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jul 2 08:21:48.230098 kernel: ata1.00: Features: NCQ-prio Jul 2 08:21:48.264664 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jul 2 08:21:48.264681 kernel: ata2.00: Features: NCQ-prio Jul 2 08:21:48.264688 kernel: hub 1-14:1.0: USB hub found Jul 2 08:21:48.293691 kernel: ata1.00: configured for UDMA/133 Jul 2 08:21:48.293707 kernel: hub 1-14:1.0: 4 ports detected Jul 2 08:21:48.294648 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Jul 2 08:21:48.297562 kernel: ata2.00: configured for UDMA/133 Jul 2 08:21:48.343609 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Jul 2 08:21:48.362565 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Jul 2 08:21:48.402562 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Jul 2 08:21:48.402694 kernel: port_module: 9 callbacks suppressed Jul 2 08:21:48.402704 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Jul 2 08:21:48.459879 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 08:21:48.459907 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Jul 2 08:21:48.459998 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 08:21:48.460006 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jul 2 08:21:48.460091 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jul 2 08:21:48.460192 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Jul 2 08:21:48.460260 kernel: sd 0:0:0:0: [sdb] Write Protect is off Jul 2 08:21:48.460315 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Jul 2 08:21:48.460372 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 08:21:48.460426 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 08:21:48.460434 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 08:21:48.460440 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Jul 2 08:21:48.645805 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Jul 2 08:21:48.645833 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Jul 2 08:21:48.676713 kernel: sd 1:0:0:0: [sda] Write Protect is off Jul 2 08:21:48.676790 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Jul 2 08:21:48.676851 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 08:21:48.711366 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 08:21:48.711383 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 08:21:48.730624 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 08:21:48.761609 kernel: GPT:9289727 != 937703087 Jul 2 08:21:48.761624 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 08:21:48.777915 kernel: GPT:9289727 != 937703087 Jul 2 08:21:48.791718 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 08:21:48.807095 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 08:21:48.807110 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 08:21:48.852850 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 08:21:48.852865 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Jul 2 08:21:48.896461 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 08:21:49.023687 kernel: usbcore: registered new interface driver usbhid Jul 2 08:21:49.023703 kernel: usbhid: USB HID core driver Jul 2 08:21:49.023710 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (668) Jul 2 08:21:49.023717 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Jul 2 08:21:49.023724 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jul 2 08:21:49.023794 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Jul 2 08:21:49.023858 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Jul 2 08:21:48.940657 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 08:21:49.134711 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Jul 2 08:21:49.134728 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Jul 2 08:21:49.134947 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Jul 2 08:21:48.976284 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 08:21:49.130229 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 08:21:49.147635 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 08:21:49.193653 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 08:21:49.193666 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 08:21:49.155239 systemd[1]: Starting disk-uuid.service... Jul 2 08:21:49.207653 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 08:21:49.207700 disk-uuid[695]: Primary Header is updated. Jul 2 08:21:49.207700 disk-uuid[695]: Secondary Entries is updated. Jul 2 08:21:49.207700 disk-uuid[695]: Secondary Header is updated. Jul 2 08:21:49.266630 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 08:21:49.266641 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 08:21:49.266648 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 08:21:50.252213 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 08:21:50.271614 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 08:21:50.271629 disk-uuid[696]: The operation has completed successfully. Jul 2 08:21:50.308938 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 08:21:50.404102 kernel: audit: type=1130 audit(1719908510.315:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.404117 kernel: audit: type=1131 audit(1719908510.315:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.308982 systemd[1]: Finished disk-uuid.service. Jul 2 08:21:50.434606 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 08:21:50.319707 systemd[1]: Starting verity-setup.service... Jul 2 08:21:50.465148 systemd[1]: Found device dev-mapper-usr.device. Jul 2 08:21:50.475805 systemd[1]: Mounting sysusr-usr.mount... Jul 2 08:21:50.488810 systemd[1]: Finished verity-setup.service. Jul 2 08:21:50.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.551561 kernel: audit: type=1130 audit(1719908510.503:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.579457 systemd[1]: Mounted sysusr-usr.mount. Jul 2 08:21:50.593710 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 08:21:50.586894 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 08:21:50.676910 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:21:50.676924 kernel: BTRFS info (device sda6): using free space tree Jul 2 08:21:50.676932 kernel: BTRFS info (device sda6): has skinny extents Jul 2 08:21:50.676939 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 08:21:50.587278 systemd[1]: Starting ignition-setup.service... Jul 2 08:21:50.608994 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 08:21:50.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.685043 systemd[1]: Finished ignition-setup.service. Jul 2 08:21:50.805938 kernel: audit: type=1130 audit(1719908510.700:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.806015 kernel: audit: type=1130 audit(1719908510.756:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.700889 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 08:21:50.836350 kernel: audit: type=1334 audit(1719908510.813:24): prog-id=9 op=LOAD Jul 2 08:21:50.813000 audit: BPF prog-id=9 op=LOAD Jul 2 08:21:50.757183 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 08:21:50.814475 systemd[1]: Starting systemd-networkd.service... Jul 2 08:21:50.850306 systemd-networkd[880]: lo: Link UP Jul 2 08:21:50.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.880434 ignition[870]: Ignition 2.14.0 Jul 2 08:21:50.932781 kernel: audit: type=1130 audit(1719908510.866:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.850309 systemd-networkd[880]: lo: Gained carrier Jul 2 08:21:50.880439 ignition[870]: Stage: fetch-offline Jul 2 08:21:50.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.850608 systemd-networkd[880]: Enumeration completed Jul 2 08:21:51.081649 kernel: audit: type=1130 audit(1719908510.947:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:51.081745 kernel: audit: type=1130 audit(1719908511.007:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:51.081759 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Jul 2 08:21:51.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.880465 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:21:51.116901 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Jul 2 08:21:50.850678 systemd[1]: Started systemd-networkd.service. Jul 2 08:21:50.880478 ignition[870]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 08:21:50.851250 systemd-networkd[880]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 08:21:51.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.888919 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 08:21:50.866703 systemd[1]: Reached target network.target. Jul 2 08:21:51.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:51.182862 iscsid[900]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 08:21:51.182862 iscsid[900]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 08:21:51.182862 iscsid[900]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 08:21:51.182862 iscsid[900]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 08:21:51.182862 iscsid[900]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 08:21:51.182862 iscsid[900]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 08:21:51.182862 iscsid[900]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 08:21:51.335725 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Jul 2 08:21:51.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:50.888982 ignition[870]: parsed url from cmdline: "" Jul 2 08:21:50.893333 unknown[870]: fetched base config from "system" Jul 2 08:21:50.888984 ignition[870]: no config URL provided Jul 2 08:21:50.893337 unknown[870]: fetched user config from "system" Jul 2 08:21:50.888987 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 08:21:50.927228 systemd[1]: Starting iscsiuio.service... Jul 2 08:21:50.889009 ignition[870]: parsing config with SHA512: 83097e4777c30c2ce6c0733938c493c6217a9aa9cb17604ea5e9751eec0fc52e5763e93f908396dc92e02b18f9d812eff8901d2cd42ff7e35895c4f935df3660 Jul 2 08:21:50.940827 systemd[1]: Started iscsiuio.service. Jul 2 08:21:50.893621 ignition[870]: fetch-offline: fetch-offline passed Jul 2 08:21:50.947798 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 08:21:50.893623 ignition[870]: POST message to Packet Timeline Jul 2 08:21:51.007807 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 08:21:50.893628 ignition[870]: POST Status error: resource requires networking Jul 2 08:21:51.008251 systemd[1]: Starting ignition-kargs.service... Jul 2 08:21:50.893683 ignition[870]: Ignition finished successfully Jul 2 08:21:51.083776 systemd-networkd[880]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 08:21:51.086078 ignition[890]: Ignition 2.14.0 Jul 2 08:21:51.096111 systemd[1]: Starting iscsid.service... Jul 2 08:21:51.086082 ignition[890]: Stage: kargs Jul 2 08:21:51.123917 systemd[1]: Started iscsid.service. Jul 2 08:21:51.086136 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:21:51.138081 systemd[1]: Starting dracut-initqueue.service... Jul 2 08:21:51.086145 ignition[890]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 08:21:51.156831 systemd[1]: Finished dracut-initqueue.service. Jul 2 08:21:51.087441 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 08:21:51.175735 systemd[1]: Reached target remote-fs-pre.target. Jul 2 08:21:51.088990 ignition[890]: kargs: kargs passed Jul 2 08:21:51.191737 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 08:21:51.088993 ignition[890]: POST message to Packet Timeline Jul 2 08:21:51.210611 systemd[1]: Reached target remote-fs.target. Jul 2 08:21:51.089003 ignition[890]: GET https://metadata.packet.net/metadata: attempt #1 Jul 2 08:21:51.244859 systemd[1]: Starting dracut-pre-mount.service... Jul 2 08:21:51.094790 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58721->[::1]:53: read: connection refused Jul 2 08:21:51.263986 systemd[1]: Finished dracut-pre-mount.service. Jul 2 08:21:51.295255 ignition[890]: GET https://metadata.packet.net/metadata: attempt #2 Jul 2 08:21:51.326197 systemd-networkd[880]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 08:21:51.295640 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53676->[::1]:53: read: connection refused Jul 2 08:21:51.354872 systemd-networkd[880]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 08:21:51.383701 systemd-networkd[880]: enp2s0f1np1: Link UP Jul 2 08:21:51.384072 systemd-networkd[880]: enp2s0f1np1: Gained carrier Jul 2 08:21:51.395064 systemd-networkd[880]: enp2s0f0np0: Link UP Jul 2 08:21:51.395436 systemd-networkd[880]: eno2: Link UP Jul 2 08:21:51.395817 systemd-networkd[880]: eno1: Link UP Jul 2 08:21:51.696352 ignition[890]: GET https://metadata.packet.net/metadata: attempt #3 Jul 2 08:21:51.697526 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44882->[::1]:53: read: connection refused Jul 2 08:21:52.149318 systemd-networkd[880]: enp2s0f0np0: Gained carrier Jul 2 08:21:52.158780 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Jul 2 08:21:52.180892 systemd-networkd[880]: enp2s0f0np0: DHCPv4 address 147.75.203.89/31, gateway 147.75.203.88 acquired from 145.40.83.140 Jul 2 08:21:52.497979 ignition[890]: GET https://metadata.packet.net/metadata: attempt #4 Jul 2 08:21:52.499224 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60719->[::1]:53: read: connection refused Jul 2 08:21:52.766055 systemd-networkd[880]: enp2s0f1np1: Gained IPv6LL Jul 2 08:21:53.918035 systemd-networkd[880]: enp2s0f0np0: Gained IPv6LL Jul 2 08:21:54.100676 ignition[890]: GET https://metadata.packet.net/metadata: attempt #5 Jul 2 08:21:54.102086 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57672->[::1]:53: read: connection refused Jul 2 08:21:57.305490 ignition[890]: GET https://metadata.packet.net/metadata: attempt #6 Jul 2 08:21:57.345432 ignition[890]: GET result: OK Jul 2 08:21:57.532321 ignition[890]: Ignition finished successfully Jul 2 08:21:57.535088 systemd[1]: Finished ignition-kargs.service. Jul 2 08:21:57.624734 kernel: kauditd_printk_skb: 3 callbacks suppressed Jul 2 08:21:57.624757 kernel: audit: type=1130 audit(1719908517.548:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:57.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:57.557787 ignition[919]: Ignition 2.14.0 Jul 2 08:21:57.551133 systemd[1]: Starting ignition-disks.service... Jul 2 08:21:57.557790 ignition[919]: Stage: disks Jul 2 08:21:57.557849 ignition[919]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:21:57.557859 ignition[919]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 08:21:57.560186 ignition[919]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 08:21:57.560755 ignition[919]: disks: disks passed Jul 2 08:21:57.560758 ignition[919]: POST message to Packet Timeline Jul 2 08:21:57.560769 ignition[919]: GET https://metadata.packet.net/metadata: attempt #1 Jul 2 08:21:57.590671 ignition[919]: GET result: OK Jul 2 08:21:57.792253 ignition[919]: Ignition finished successfully Jul 2 08:21:57.794268 systemd[1]: Finished ignition-disks.service. Jul 2 08:21:57.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:57.809241 systemd[1]: Reached target initrd-root-device.target. Jul 2 08:21:57.881898 kernel: audit: type=1130 audit(1719908517.808:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:57.872797 systemd[1]: Reached target local-fs-pre.target. Jul 2 08:21:57.889799 systemd[1]: Reached target local-fs.target. Jul 2 08:21:57.904772 systemd[1]: Reached target sysinit.target. Jul 2 08:21:57.919920 systemd[1]: Reached target basic.target. Jul 2 08:21:57.934875 systemd[1]: Starting systemd-fsck-root.service... Jul 2 08:21:57.965448 systemd-fsck[936]: ROOT: clean, 614/553520 files, 56020/553472 blocks Jul 2 08:21:57.978197 systemd[1]: Finished systemd-fsck-root.service. Jul 2 08:21:58.069717 kernel: audit: type=1130 audit(1719908517.986:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.069731 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 08:21:57.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:57.995437 systemd[1]: Mounting sysroot.mount... Jul 2 08:21:58.077226 systemd[1]: Mounted sysroot.mount. Jul 2 08:21:58.090874 systemd[1]: Reached target initrd-root-fs.target. Jul 2 08:21:58.106407 systemd[1]: Mounting sysroot-usr.mount... Jul 2 08:21:58.121441 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 08:21:58.136138 systemd[1]: Starting flatcar-static-network.service... Jul 2 08:21:58.153727 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 08:21:58.153799 systemd[1]: Reached target ignition-diskful.target. Jul 2 08:21:58.173516 systemd[1]: Mounted sysroot-usr.mount. Jul 2 08:21:58.196624 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 08:21:58.209420 systemd[1]: Starting initrd-setup-root.service... Jul 2 08:21:58.331698 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (949) Jul 2 08:21:58.331713 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:21:58.331721 kernel: BTRFS info (device sda6): using free space tree Jul 2 08:21:58.331728 kernel: BTRFS info (device sda6): has skinny extents Jul 2 08:21:58.331735 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 08:21:58.272602 systemd[1]: Finished initrd-setup-root.service. Jul 2 08:21:58.401649 kernel: audit: type=1130 audit(1719908518.348:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.401693 coreos-metadata[944]: Jul 02 08:21:58.294 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 08:21:58.401693 coreos-metadata[944]: Jul 02 08:21:58.337 INFO Fetch successful Jul 2 08:21:58.422842 coreos-metadata[943]: Jul 02 08:21:58.294 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 08:21:58.422842 coreos-metadata[943]: Jul 02 08:21:58.338 INFO Fetch successful Jul 2 08:21:58.422842 coreos-metadata[943]: Jul 02 08:21:58.357 INFO wrote hostname ci-3510.3.5-a-12d7dcb878 to /sysroot/etc/hostname Jul 2 08:21:58.635681 kernel: audit: type=1130 audit(1719908518.438:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.635696 kernel: audit: type=1130 audit(1719908518.502:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.635706 kernel: audit: type=1131 audit(1719908518.502:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.635769 initrd-setup-root[954]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 08:21:58.349912 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 08:21:58.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.689737 initrd-setup-root[962]: cut: /sysroot/etc/group: No such file or directory Jul 2 08:21:58.727781 kernel: audit: type=1130 audit(1719908518.661:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.409933 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 08:21:58.736817 initrd-setup-root[970]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 08:21:58.438888 systemd[1]: flatcar-static-network.service: Deactivated successfully. Jul 2 08:21:58.756775 initrd-setup-root[978]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 08:21:58.438930 systemd[1]: Finished flatcar-static-network.service. Jul 2 08:21:58.774771 ignition[1019]: INFO : Ignition 2.14.0 Jul 2 08:21:58.774771 ignition[1019]: INFO : Stage: mount Jul 2 08:21:58.774771 ignition[1019]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:21:58.774771 ignition[1019]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 08:21:58.774771 ignition[1019]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 08:21:58.774771 ignition[1019]: INFO : mount: mount passed Jul 2 08:21:58.774771 ignition[1019]: INFO : POST message to Packet Timeline Jul 2 08:21:58.774771 ignition[1019]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 08:21:58.774771 ignition[1019]: INFO : GET result: OK Jul 2 08:21:58.503167 systemd[1]: Starting ignition-mount.service... Jul 2 08:21:58.623195 systemd[1]: Starting sysroot-boot.service... Jul 2 08:21:58.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.938611 kernel: audit: type=1130 audit(1719908518.879:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:21:58.938641 ignition[1019]: INFO : Ignition finished successfully Jul 2 08:21:58.643516 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 08:21:58.643553 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 08:21:59.001660 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1033) Jul 2 08:21:59.001673 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:21:58.644198 systemd[1]: Finished sysroot-boot.service. Jul 2 08:21:59.047647 kernel: BTRFS info (device sda6): using free space tree Jul 2 08:21:59.047658 kernel: BTRFS info (device sda6): has skinny extents Jul 2 08:21:59.047665 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 08:21:58.870066 systemd[1]: Finished ignition-mount.service. Jul 2 08:21:58.881639 systemd[1]: Starting ignition-files.service... Jul 2 08:21:58.947356 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 08:21:59.081455 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 08:21:59.112316 unknown[1052]: wrote ssh authorized keys file for user: core Jul 2 08:21:59.124656 ignition[1052]: INFO : Ignition 2.14.0 Jul 2 08:21:59.124656 ignition[1052]: INFO : Stage: files Jul 2 08:21:59.124656 ignition[1052]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:21:59.124656 ignition[1052]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 08:21:59.124656 ignition[1052]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 08:21:59.124656 ignition[1052]: DEBUG : files: compiled without relabeling support, skipping Jul 2 08:21:59.124656 ignition[1052]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 08:21:59.124656 ignition[1052]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 08:21:59.124656 ignition[1052]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 08:21:59.124656 ignition[1052]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 08:21:59.124656 ignition[1052]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 08:21:59.124656 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 08:21:59.124656 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 08:21:59.301688 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1071) Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Jul 2 08:21:59.301725 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 08:21:59.566922 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1043158333" Jul 2 08:21:59.566922 ignition[1052]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1043158333": device or resource busy Jul 2 08:21:59.566922 ignition[1052]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1043158333", trying btrfs: device or resource busy Jul 2 08:21:59.566922 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1043158333" Jul 2 08:21:59.566922 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1043158333" Jul 2 08:21:59.566922 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1043158333" Jul 2 08:21:59.566922 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1043158333" Jul 2 08:21:59.566922 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Jul 2 08:21:59.566922 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 08:21:59.566922 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Jul 2 08:21:59.744890 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Jul 2 08:21:59.950063 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 08:21:59.950063 ignition[1052]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 08:21:59.950063 ignition[1052]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 08:21:59.950063 ignition[1052]: INFO : files: op(10): [started] processing unit "packet-phone-home.service" Jul 2 08:21:59.950063 ignition[1052]: INFO : files: op(10): [finished] processing unit "packet-phone-home.service" Jul 2 08:21:59.950063 ignition[1052]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(13): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(13): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(14): [started] setting preset to enabled for "packet-phone-home.service" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(14): [finished] setting preset to enabled for "packet-phone-home.service" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 08:22:00.032801 ignition[1052]: INFO : files: files passed Jul 2 08:22:00.032801 ignition[1052]: INFO : POST message to Packet Timeline Jul 2 08:22:00.032801 ignition[1052]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 08:22:00.032801 ignition[1052]: INFO : GET result: OK Jul 2 08:22:00.281812 kernel: audit: type=1130 audit(1719908520.183:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.163163 systemd[1]: Finished ignition-files.service. Jul 2 08:22:00.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.302812 ignition[1052]: INFO : Ignition finished successfully Jul 2 08:22:00.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.189453 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 08:22:00.338944 initrd-setup-root-after-ignition[1087]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 08:22:00.250821 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 08:22:00.251131 systemd[1]: Starting ignition-quench.service... Jul 2 08:22:00.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.271909 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 08:22:00.295830 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 08:22:00.295881 systemd[1]: Finished ignition-quench.service. Jul 2 08:22:00.311974 systemd[1]: Reached target ignition-complete.target. Jul 2 08:22:00.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.330129 systemd[1]: Starting initrd-parse-etc.service... Jul 2 08:22:00.371405 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 08:22:00.371639 systemd[1]: Finished initrd-parse-etc.service. Jul 2 08:22:00.386194 systemd[1]: Reached target initrd-fs.target. Jul 2 08:22:00.400805 systemd[1]: Reached target initrd.target. Jul 2 08:22:00.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.416918 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 08:22:00.418719 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 08:22:00.428829 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 08:22:00.447143 systemd[1]: Starting initrd-cleanup.service... Jul 2 08:22:00.468276 systemd[1]: Stopped target nss-lookup.target. Jul 2 08:22:00.480044 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 08:22:00.496283 systemd[1]: Stopped target timers.target. Jul 2 08:22:00.510245 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 08:22:00.510633 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 08:22:00.525538 systemd[1]: Stopped target initrd.target. Jul 2 08:22:00.539251 systemd[1]: Stopped target basic.target. Jul 2 08:22:00.558235 systemd[1]: Stopped target ignition-complete.target. Jul 2 08:22:00.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.575233 systemd[1]: Stopped target ignition-diskful.target. Jul 2 08:22:00.591245 systemd[1]: Stopped target initrd-root-device.target. Jul 2 08:22:00.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.607258 systemd[1]: Stopped target remote-fs.target. Jul 2 08:22:00.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.623241 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 08:22:00.640277 systemd[1]: Stopped target sysinit.target. Jul 2 08:22:00.656267 systemd[1]: Stopped target local-fs.target. Jul 2 08:22:00.673265 systemd[1]: Stopped target local-fs-pre.target. Jul 2 08:22:00.688244 systemd[1]: Stopped target swap.target. Jul 2 08:22:00.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.702132 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 08:22:00.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.702499 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 08:22:00.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.718454 systemd[1]: Stopped target cryptsetup.target. Jul 2 08:22:00.897672 ignition[1102]: INFO : Ignition 2.14.0 Jul 2 08:22:00.897672 ignition[1102]: INFO : Stage: umount Jul 2 08:22:00.897672 ignition[1102]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:22:00.897672 ignition[1102]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 08:22:00.897672 ignition[1102]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 08:22:00.897672 ignition[1102]: INFO : umount: umount passed Jul 2 08:22:00.897672 ignition[1102]: INFO : POST message to Packet Timeline Jul 2 08:22:00.897672 ignition[1102]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 08:22:00.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:01.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:01.016178 iscsid[900]: iscsid shutting down. Jul 2 08:22:00.735146 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 08:22:01.045915 ignition[1102]: INFO : GET result: OK Jul 2 08:22:01.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.735507 systemd[1]: Stopped dracut-initqueue.service. Jul 2 08:22:01.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:01.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.752403 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 08:22:00.752776 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 08:22:00.768455 systemd[1]: Stopped target paths.target. Jul 2 08:22:01.121755 ignition[1102]: INFO : Ignition finished successfully Jul 2 08:22:00.782131 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 08:22:01.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.785769 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 08:22:01.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.799261 systemd[1]: Stopped target slices.target. Jul 2 08:22:01.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.813226 systemd[1]: Stopped target sockets.target. Jul 2 08:22:01.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:01.195000 audit: BPF prog-id=6 op=UNLOAD Jul 2 08:22:00.829244 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 08:22:00.829651 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 08:22:01.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.846351 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 08:22:01.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.846732 systemd[1]: Stopped ignition-files.service. Jul 2 08:22:01.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.861329 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 08:22:01.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.861716 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 08:22:00.879409 systemd[1]: Stopping ignition-mount.service... Jul 2 08:22:01.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.890791 systemd[1]: Stopping iscsid.service... Jul 2 08:22:01.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.904729 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 08:22:01.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.904894 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 08:22:00.924515 systemd[1]: Stopping sysroot-boot.service... Jul 2 08:22:01.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.934757 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 08:22:00.934944 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 08:22:00.966207 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 08:22:01.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.966523 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 08:22:01.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.992952 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 08:22:01.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:00.994602 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 08:22:00.994839 systemd[1]: Stopped iscsid.service. Jul 2 08:22:01.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:01.002015 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 08:22:01.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:01.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:01.002270 systemd[1]: Closed iscsid.socket. Jul 2 08:22:01.024027 systemd[1]: Stopping iscsiuio.service... Jul 2 08:22:01.038249 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 08:22:01.038461 systemd[1]: Stopped iscsiuio.service. Jul 2 08:22:01.053434 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 08:22:01.053660 systemd[1]: Finished initrd-cleanup.service. Jul 2 08:22:01.069632 systemd[1]: Stopped target network.target. Jul 2 08:22:01.083782 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 08:22:01.083874 systemd[1]: Closed iscsiuio.socket. Jul 2 08:22:01.100869 systemd[1]: Stopping systemd-networkd.service... Jul 2 08:22:01.109723 systemd-networkd[880]: enp2s0f1np1: DHCPv6 lease lost Jul 2 08:22:01.109847 systemd[1]: Stopping systemd-resolved.service... Jul 2 08:22:01.115703 systemd-networkd[880]: enp2s0f0np0: DHCPv6 lease lost Jul 2 08:22:01.601000 audit: BPF prog-id=9 op=UNLOAD Jul 2 08:22:01.128953 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 08:22:01.129029 systemd[1]: Stopped systemd-resolved.service. Jul 2 08:22:01.146803 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 08:22:01.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:01.146928 systemd[1]: Stopped systemd-networkd.service. Jul 2 08:22:01.164339 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 08:22:01.164538 systemd[1]: Stopped ignition-mount.service. Jul 2 08:22:01.181258 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 08:22:01.181455 systemd[1]: Stopped sysroot-boot.service. Jul 2 08:22:01.196223 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 08:22:01.196305 systemd[1]: Closed systemd-networkd.socket. Jul 2 08:22:01.210794 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 08:22:01.210907 systemd[1]: Stopped ignition-disks.service. Jul 2 08:22:01.228831 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 08:22:01.228942 systemd[1]: Stopped ignition-kargs.service. Jul 2 08:22:01.244827 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 08:22:01.244943 systemd[1]: Stopped ignition-setup.service. Jul 2 08:22:01.260925 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 08:22:01.261059 systemd[1]: Stopped initrd-setup-root.service. Jul 2 08:22:01.277648 systemd[1]: Stopping network-cleanup.service... Jul 2 08:22:01.293760 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 08:22:01.293905 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 08:22:01.310959 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 08:22:01.311093 systemd[1]: Stopped systemd-sysctl.service. Jul 2 08:22:01.326238 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 08:22:01.326367 systemd[1]: Stopped systemd-modules-load.service. Jul 2 08:22:01.341125 systemd[1]: Stopping systemd-udevd.service... Jul 2 08:22:01.362540 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 08:22:01.363941 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 08:22:01.364236 systemd[1]: Stopped systemd-udevd.service. Jul 2 08:22:01.377431 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 08:22:01.377545 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 08:22:01.391874 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 08:22:01.391962 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 08:22:01.410640 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 08:22:01.410663 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 08:22:01.419871 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 08:22:01.419899 systemd[1]: Stopped dracut-cmdline.service. Jul 2 08:22:01.442855 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 08:22:01.442908 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 08:22:01.458892 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 08:22:01.473753 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 08:22:01.473782 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 08:22:01.488740 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 08:22:01.488945 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 08:22:01.621078 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 08:22:01.621121 systemd[1]: Stopped network-cleanup.service. Jul 2 08:22:01.634137 systemd[1]: Reached target initrd-switch-root.target. Jul 2 08:22:01.653479 systemd[1]: Starting initrd-switch-root.service... Jul 2 08:22:01.675097 systemd[1]: Switching root. Jul 2 08:22:01.722378 systemd-journald[267]: Journal stopped Jul 2 08:22:05.619275 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Jul 2 08:22:05.619289 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 08:22:05.619297 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 08:22:05.619303 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 08:22:05.619308 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 08:22:05.619313 kernel: SELinux: policy capability open_perms=1 Jul 2 08:22:05.619319 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 08:22:05.619324 kernel: SELinux: policy capability always_check_network=0 Jul 2 08:22:05.619330 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 08:22:05.619335 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 08:22:05.619341 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 08:22:05.619346 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 08:22:05.619351 systemd[1]: Successfully loaded SELinux policy in 298.447ms. Jul 2 08:22:05.619358 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.562ms. Jul 2 08:22:05.619366 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 08:22:05.619372 systemd[1]: Detected architecture x86-64. Jul 2 08:22:05.619378 systemd[1]: Detected first boot. Jul 2 08:22:05.619383 systemd[1]: Hostname set to . Jul 2 08:22:05.619390 systemd[1]: Initializing machine ID from random generator. Jul 2 08:22:05.619396 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 08:22:05.619402 kernel: kauditd_printk_skb: 49 callbacks suppressed Jul 2 08:22:05.619408 kernel: audit: type=1400 audit(1719908522.532:90): avc: denied { associate } for pid=1141 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 08:22:05.619415 kernel: audit: type=1300 audit(1719908522.532:90): arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1124 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:05.619421 kernel: audit: type=1327 audit(1719908522.532:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 08:22:05.619427 kernel: audit: type=1400 audit(1719908522.557:91): avc: denied { associate } for pid=1141 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 08:22:05.619433 kernel: audit: type=1300 audit(1719908522.557:91): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1124 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:05.619440 kernel: audit: type=1307 audit(1719908522.557:91): cwd="/" Jul 2 08:22:05.619446 kernel: audit: type=1302 audit(1719908522.557:91): item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:05.619452 kernel: audit: type=1302 audit(1719908522.557:91): item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:05.619458 kernel: audit: type=1327 audit(1719908522.557:91): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 08:22:05.619463 systemd[1]: Populated /etc with preset unit settings. Jul 2 08:22:05.619469 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:22:05.619477 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:22:05.619483 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:22:05.619489 kernel: audit: type=1334 audit(1719908524.142:92): prog-id=12 op=LOAD Jul 2 08:22:05.619495 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 08:22:05.619501 systemd[1]: Stopped initrd-switch-root.service. Jul 2 08:22:05.619506 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 08:22:05.619513 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 08:22:05.619520 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 08:22:05.619528 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 08:22:05.619534 systemd[1]: Created slice system-getty.slice. Jul 2 08:22:05.619540 systemd[1]: Created slice system-modprobe.slice. Jul 2 08:22:05.619546 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 08:22:05.619553 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 08:22:05.619562 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 08:22:05.619568 systemd[1]: Created slice user.slice. Jul 2 08:22:05.619574 systemd[1]: Started systemd-ask-password-console.path. Jul 2 08:22:05.619602 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 08:22:05.619608 systemd[1]: Set up automount boot.automount. Jul 2 08:22:05.619630 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 08:22:05.619636 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 08:22:05.619642 systemd[1]: Stopped target initrd-fs.target. Jul 2 08:22:05.619648 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 08:22:05.619654 systemd[1]: Reached target integritysetup.target. Jul 2 08:22:05.619660 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 08:22:05.619667 systemd[1]: Reached target remote-fs.target. Jul 2 08:22:05.619674 systemd[1]: Reached target slices.target. Jul 2 08:22:05.619680 systemd[1]: Reached target swap.target. Jul 2 08:22:05.619686 systemd[1]: Reached target torcx.target. Jul 2 08:22:05.619692 systemd[1]: Reached target veritysetup.target. Jul 2 08:22:05.619698 systemd[1]: Listening on systemd-coredump.socket. Jul 2 08:22:05.619704 systemd[1]: Listening on systemd-initctl.socket. Jul 2 08:22:05.619710 systemd[1]: Listening on systemd-networkd.socket. Jul 2 08:22:05.619718 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 08:22:05.619724 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 08:22:05.619731 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 08:22:05.619737 systemd[1]: Mounting dev-hugepages.mount... Jul 2 08:22:05.619743 systemd[1]: Mounting dev-mqueue.mount... Jul 2 08:22:05.619751 systemd[1]: Mounting media.mount... Jul 2 08:22:05.619757 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:22:05.619764 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 08:22:05.619770 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 08:22:05.619776 systemd[1]: Mounting tmp.mount... Jul 2 08:22:05.619783 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 08:22:05.619789 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:22:05.619795 systemd[1]: Starting kmod-static-nodes.service... Jul 2 08:22:05.619802 systemd[1]: Starting modprobe@configfs.service... Jul 2 08:22:05.619809 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:22:05.619815 systemd[1]: Starting modprobe@drm.service... Jul 2 08:22:05.619821 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:22:05.619828 systemd[1]: Starting modprobe@fuse.service... Jul 2 08:22:05.619834 kernel: fuse: init (API version 7.34) Jul 2 08:22:05.619840 systemd[1]: Starting modprobe@loop.service... Jul 2 08:22:05.619846 kernel: loop: module loaded Jul 2 08:22:05.619852 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 08:22:05.619858 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 08:22:05.619866 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 08:22:05.619873 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 08:22:05.619879 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 08:22:05.619885 systemd[1]: Stopped systemd-journald.service. Jul 2 08:22:05.619892 systemd[1]: Starting systemd-journald.service... Jul 2 08:22:05.619898 systemd[1]: Starting systemd-modules-load.service... Jul 2 08:22:05.619906 systemd-journald[1251]: Journal started Jul 2 08:22:05.619931 systemd-journald[1251]: Runtime Journal (/run/log/journal/3fec9e3e885b41229dde11b298f03c7b) is 8.0M, max 636.8M, 628.8M free. Jul 2 08:22:02.178000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 08:22:02.459000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 08:22:02.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 08:22:02.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 08:22:02.461000 audit: BPF prog-id=10 op=LOAD Jul 2 08:22:02.461000 audit: BPF prog-id=10 op=UNLOAD Jul 2 08:22:02.461000 audit: BPF prog-id=11 op=LOAD Jul 2 08:22:02.461000 audit: BPF prog-id=11 op=UNLOAD Jul 2 08:22:02.532000 audit[1141]: AVC avc: denied { associate } for pid=1141 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 08:22:02.532000 audit[1141]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1124 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:02.532000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 08:22:02.557000 audit[1141]: AVC avc: denied { associate } for pid=1141 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 08:22:02.557000 audit[1141]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1124 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:02.557000 audit: CWD cwd="/" Jul 2 08:22:02.557000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:02.557000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:02.557000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 08:22:04.142000 audit: BPF prog-id=12 op=LOAD Jul 2 08:22:04.142000 audit: BPF prog-id=3 op=UNLOAD Jul 2 08:22:04.167000 audit: BPF prog-id=13 op=LOAD Jul 2 08:22:04.167000 audit: BPF prog-id=14 op=LOAD Jul 2 08:22:04.167000 audit: BPF prog-id=4 op=UNLOAD Jul 2 08:22:04.167000 audit: BPF prog-id=5 op=UNLOAD Jul 2 08:22:04.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:04.224000 audit: BPF prog-id=12 op=UNLOAD Jul 2 08:22:04.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:04.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.591000 audit: BPF prog-id=15 op=LOAD Jul 2 08:22:05.592000 audit: BPF prog-id=16 op=LOAD Jul 2 08:22:05.592000 audit: BPF prog-id=17 op=LOAD Jul 2 08:22:05.592000 audit: BPF prog-id=13 op=UNLOAD Jul 2 08:22:05.592000 audit: BPF prog-id=14 op=UNLOAD Jul 2 08:22:05.616000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 08:22:05.616000 audit[1251]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcb136d8a0 a2=4000 a3=7ffcb136d93c items=0 ppid=1 pid=1251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:05.616000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 08:22:04.141177 systemd[1]: Queued start job for default target multi-user.target. Jul 2 08:22:02.530292 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:22:04.168559 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 08:22:02.530741 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 08:22:02.530760 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 08:22:02.530788 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 08:22:02.530798 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 08:22:02.530824 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 08:22:02.530835 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 08:22:02.531006 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 08:22:02.531041 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 08:22:02.531054 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 08:22:02.532323 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 08:22:02.532355 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 08:22:02.532373 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 08:22:02.532386 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 08:22:02.532401 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 08:22:02.532413 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 08:22:03.780369 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:03Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:22:03.780509 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:03Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:22:03.780573 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:03Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:22:03.780702 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:03Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:22:03.780732 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:03Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 08:22:03.780766 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-07-02T08:22:03Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 08:22:05.650746 systemd[1]: Starting systemd-network-generator.service... Jul 2 08:22:05.673772 systemd[1]: Starting systemd-remount-fs.service... Jul 2 08:22:05.694624 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 08:22:05.727049 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 08:22:05.727074 systemd[1]: Stopped verity-setup.service. Jul 2 08:22:05.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.761598 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:22:05.775598 systemd[1]: Started systemd-journald.service. Jul 2 08:22:05.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.784097 systemd[1]: Mounted dev-hugepages.mount. Jul 2 08:22:05.791825 systemd[1]: Mounted dev-mqueue.mount. Jul 2 08:22:05.798813 systemd[1]: Mounted media.mount. Jul 2 08:22:05.805804 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 08:22:05.814800 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 08:22:05.822782 systemd[1]: Mounted tmp.mount. Jul 2 08:22:05.829869 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 08:22:05.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.837887 systemd[1]: Finished kmod-static-nodes.service. Jul 2 08:22:05.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.845984 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 08:22:05.846107 systemd[1]: Finished modprobe@configfs.service. Jul 2 08:22:05.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.854991 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:22:05.855127 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:22:05.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.864116 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 08:22:05.864307 systemd[1]: Finished modprobe@drm.service. Jul 2 08:22:05.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.873377 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:22:05.873713 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:22:05.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.882384 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 08:22:05.882735 systemd[1]: Finished modprobe@fuse.service. Jul 2 08:22:05.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.891389 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:22:05.891740 systemd[1]: Finished modprobe@loop.service. Jul 2 08:22:05.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.900397 systemd[1]: Finished systemd-modules-load.service. Jul 2 08:22:05.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.909355 systemd[1]: Finished systemd-network-generator.service. Jul 2 08:22:05.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.918364 systemd[1]: Finished systemd-remount-fs.service. Jul 2 08:22:05.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.927368 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 08:22:05.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:05.937009 systemd[1]: Reached target network-pre.target. Jul 2 08:22:05.948384 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 08:22:05.957234 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 08:22:05.964737 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 08:22:05.965772 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 08:22:05.973204 systemd[1]: Starting systemd-journal-flush.service... Jul 2 08:22:05.976853 systemd-journald[1251]: Time spent on flushing to /var/log/journal/3fec9e3e885b41229dde11b298f03c7b is 15.364ms for 1603 entries. Jul 2 08:22:05.976853 systemd-journald[1251]: System Journal (/var/log/journal/3fec9e3e885b41229dde11b298f03c7b) is 8.0M, max 195.6M, 187.6M free. Jul 2 08:22:06.011938 systemd-journald[1251]: Received client request to flush runtime journal. Jul 2 08:22:05.988678 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:22:05.989155 systemd[1]: Starting systemd-random-seed.service... Jul 2 08:22:06.000688 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:22:06.001184 systemd[1]: Starting systemd-sysctl.service... Jul 2 08:22:06.008263 systemd[1]: Starting systemd-sysusers.service... Jul 2 08:22:06.015250 systemd[1]: Starting systemd-udev-settle.service... Jul 2 08:22:06.022880 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 08:22:06.030740 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 08:22:06.038762 systemd[1]: Finished systemd-journal-flush.service. Jul 2 08:22:06.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:06.046810 systemd[1]: Finished systemd-random-seed.service. Jul 2 08:22:06.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:06.054852 systemd[1]: Finished systemd-sysctl.service. Jul 2 08:22:06.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:06.062774 systemd[1]: Finished systemd-sysusers.service. Jul 2 08:22:06.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:06.071766 systemd[1]: Reached target first-boot-complete.target. Jul 2 08:22:06.079857 udevadm[1267]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 08:22:06.275333 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 08:22:06.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:06.283000 audit: BPF prog-id=18 op=LOAD Jul 2 08:22:06.283000 audit: BPF prog-id=19 op=LOAD Jul 2 08:22:06.283000 audit: BPF prog-id=7 op=UNLOAD Jul 2 08:22:06.283000 audit: BPF prog-id=8 op=UNLOAD Jul 2 08:22:06.284755 systemd[1]: Starting systemd-udevd.service... Jul 2 08:22:06.296902 systemd-udevd[1269]: Using default interface naming scheme 'v252'. Jul 2 08:22:06.314482 systemd[1]: Started systemd-udevd.service. Jul 2 08:22:06.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:06.324938 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Jul 2 08:22:06.325000 audit: BPF prog-id=20 op=LOAD Jul 2 08:22:06.326496 systemd[1]: Starting systemd-networkd.service... Jul 2 08:22:06.360809 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Jul 2 08:22:06.360871 kernel: ACPI: button: Sleep Button [SLPB] Jul 2 08:22:06.360000 audit: BPF prog-id=21 op=LOAD Jul 2 08:22:06.360000 audit: BPF prog-id=22 op=LOAD Jul 2 08:22:06.360000 audit: BPF prog-id=23 op=LOAD Jul 2 08:22:06.353000 audit[1340]: AVC avc: denied { confidentiality } for pid=1340 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 08:22:06.353000 audit[1340]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f733f402010 a1=4d8bc a2=7f73410bbbc5 a3=5 items=42 ppid=1269 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:06.353000 audit: CWD cwd="/" Jul 2 08:22:06.353000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=1 name=(null) inode=19761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=2 name=(null) inode=19761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=3 name=(null) inode=19762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=4 name=(null) inode=19761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=5 name=(null) inode=19763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=6 name=(null) inode=19761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=7 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=8 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=9 name=(null) inode=19765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=10 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=11 name=(null) inode=19766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=12 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.380583 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Jul 2 08:22:06.380608 kernel: IPMI message handler: version 39.2 Jul 2 08:22:06.380626 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 08:22:06.353000 audit: PATH item=13 name=(null) inode=19767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=14 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=15 name=(null) inode=19768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=16 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=17 name=(null) inode=19769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=18 name=(null) inode=19761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=19 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=20 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=21 name=(null) inode=19771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=22 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=23 name=(null) inode=19772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=24 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=25 name=(null) inode=19773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=26 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=27 name=(null) inode=19774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=28 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=29 name=(null) inode=19775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=30 name=(null) inode=19761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=31 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=32 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=33 name=(null) inode=19777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=34 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=35 name=(null) inode=19778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=36 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=37 name=(null) inode=19779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=38 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=39 name=(null) inode=19780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=40 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PATH item=41 name=(null) inode=19781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:22:06.353000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 08:22:06.380045 systemd[1]: Starting systemd-userdbd.service... Jul 2 08:22:06.386628 kernel: ACPI: button: Power Button [PWRF] Jul 2 08:22:06.444087 systemd[1]: Started systemd-userdbd.service. Jul 2 08:22:06.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:06.479568 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1275) Jul 2 08:22:06.482566 kernel: ipmi device interface Jul 2 08:22:06.482619 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Jul 2 08:22:06.482749 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Jul 2 08:22:06.482862 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Jul 2 08:22:06.482970 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Jul 2 08:22:06.483076 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Jul 2 08:22:06.486694 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 08:22:06.620631 systemd-networkd[1315]: bond0: netdev ready Jul 2 08:22:06.622799 systemd-networkd[1315]: lo: Link UP Jul 2 08:22:06.622801 systemd-networkd[1315]: lo: Gained carrier Jul 2 08:22:06.623272 systemd-networkd[1315]: Enumeration completed Jul 2 08:22:06.623350 systemd[1]: Started systemd-networkd.service. Jul 2 08:22:06.623554 systemd-networkd[1315]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Jul 2 08:22:06.624191 systemd-networkd[1315]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:65:fd:c7.network. Jul 2 08:22:06.626578 kernel: ipmi_si: IPMI System Interface driver Jul 2 08:22:06.626605 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Jul 2 08:22:06.626689 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Jul 2 08:22:06.626703 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Jul 2 08:22:06.626715 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Jul 2 08:22:06.626797 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Jul 2 08:22:06.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:06.660562 kernel: iTCO_vendor_support: vendor-support=0 Jul 2 08:22:06.745071 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Jul 2 08:22:06.745179 kernel: ipmi_si: Adding ACPI-specified kcs state machine Jul 2 08:22:06.745193 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Jul 2 08:22:06.783562 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Jul 2 08:22:06.818613 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Jul 2 08:22:06.818707 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Jul 2 08:22:06.830608 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Jul 2 08:22:06.830704 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 08:22:06.860610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Jul 2 08:22:06.899102 systemd-networkd[1315]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:65:fd:c6.network. Jul 2 08:22:06.922593 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Jul 2 08:22:06.922676 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Jul 2 08:22:06.939560 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 08:22:06.979565 kernel: ipmi_ssif: IPMI SSIF Interface driver Jul 2 08:22:07.018246 kernel: intel_rapl_common: Found RAPL domain package Jul 2 08:22:07.018394 kernel: intel_rapl_common: Found RAPL domain core Jul 2 08:22:07.018408 kernel: intel_rapl_common: Found RAPL domain uncore Jul 2 08:22:07.035034 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Jul 2 08:22:07.035140 kernel: intel_rapl_common: Found RAPL domain dram Jul 2 08:22:07.069614 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Jul 2 08:22:07.089760 systemd-networkd[1315]: bond0: Link UP Jul 2 08:22:07.089952 systemd-networkd[1315]: enp2s0f1np1: Link UP Jul 2 08:22:07.090085 systemd-networkd[1315]: enp2s0f1np1: Gained carrier Jul 2 08:22:07.091026 systemd-networkd[1315]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:65:fd:c6.network. Jul 2 08:22:07.127934 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Jul 2 08:22:07.127958 kernel: bond0: active interface up! Jul 2 08:22:07.150666 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Jul 2 08:22:07.196633 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 08:22:07.274613 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.296603 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.319605 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.342621 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.363596 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.384730 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.405614 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.425683 systemd-networkd[1315]: bond0: Gained carrier Jul 2 08:22:07.425817 systemd-networkd[1315]: enp2s0f0np0: Link UP Jul 2 08:22:07.425947 systemd-networkd[1315]: enp2s0f0np0: Gained carrier Jul 2 08:22:07.426722 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.463440 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 08:22:07.463480 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Jul 2 08:22:07.467864 systemd[1]: Finished systemd-udev-settle.service. Jul 2 08:22:07.471871 systemd-networkd[1315]: enp2s0f1np1: Link DOWN Jul 2 08:22:07.471874 systemd-networkd[1315]: enp2s0f1np1: Lost carrier Jul 2 08:22:07.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:07.476331 systemd[1]: Starting lvm2-activation-early.service... Jul 2 08:22:07.491764 lvm[1375]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 08:22:07.523028 systemd[1]: Finished lvm2-activation-early.service. Jul 2 08:22:07.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:07.531693 systemd[1]: Reached target cryptsetup.target. Jul 2 08:22:07.540244 systemd[1]: Starting lvm2-activation.service... Jul 2 08:22:07.542415 lvm[1377]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 08:22:07.575101 systemd[1]: Finished lvm2-activation.service. Jul 2 08:22:07.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:07.583844 systemd[1]: Reached target local-fs-pre.target. Jul 2 08:22:07.598867 kernel: kauditd_printk_skb: 105 callbacks suppressed Jul 2 08:22:07.598912 kernel: audit: type=1130 audit(1719908527.583:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:07.649770 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 08:22:07.649785 systemd[1]: Reached target local-fs.target. Jul 2 08:22:07.657806 systemd[1]: Reached target machines.target. Jul 2 08:22:07.666357 systemd[1]: Starting ldconfig.service... Jul 2 08:22:07.676903 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:22:07.676924 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:22:07.677417 systemd[1]: Starting systemd-boot-update.service... Jul 2 08:22:07.687561 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Jul 2 08:22:07.687721 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Jul 2 08:22:07.701129 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 08:22:07.706564 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Jul 2 08:22:07.724560 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Jul 2 08:22:07.724610 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Jul 2 08:22:07.724669 systemd-networkd[1315]: enp2s0f1np1: Link UP Jul 2 08:22:07.724673 systemd-networkd[1315]: enp2s0f1np1: Gained carrier Jul 2 08:22:07.759605 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Jul 2 08:22:07.788182 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 08:22:07.788825 systemd[1]: Starting systemd-sysext.service... Jul 2 08:22:07.789023 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1379 (bootctl) Jul 2 08:22:07.789591 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 08:22:07.812107 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 08:22:07.813898 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 08:22:07.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:07.873606 kernel: audit: type=1130 audit(1719908527.813:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:07.873642 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:1 Jul 2 08:22:07.892206 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 08:22:07.892311 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 08:22:07.928589 kernel: loop0: detected capacity change from 0 to 210664 Jul 2 08:22:07.942269 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 08:22:07.942596 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 08:22:07.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:07.986596 systemd-fsck[1390]: fsck.fat 4.2 (2021-01-31) Jul 2 08:22:07.986596 systemd-fsck[1390]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 08:22:07.987273 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 08:22:08.002561 kernel: audit: type=1130 audit(1719908527.942:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.002599 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 08:22:08.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.019380 systemd[1]: Mounting boot.mount... Jul 2 08:22:08.021561 kernel: audit: type=1130 audit(1719908528.017:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.087554 ldconfig[1378]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 08:22:08.088479 systemd[1]: Mounted boot.mount. Jul 2 08:22:08.095803 systemd[1]: Finished ldconfig.service. Jul 2 08:22:08.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.107114 systemd[1]: Finished systemd-boot-update.service. Jul 2 08:22:08.125699 systemd-networkd[1315]: bond0: Gained IPv6LL Jul 2 08:22:08.149743 kernel: audit: type=1130 audit(1719908528.102:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.170616 kernel: loop1: detected capacity change from 0 to 210664 Jul 2 08:22:08.170644 kernel: audit: type=1130 audit(1719908528.162:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.182423 (sd-sysext)[1394]: Using extensions 'kubernetes'. Jul 2 08:22:08.182610 (sd-sysext)[1394]: Merged extensions into '/usr'. Jul 2 08:22:08.226375 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:22:08.227079 systemd[1]: Mounting usr-share-oem.mount... Jul 2 08:22:08.233876 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:22:08.234481 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:22:08.242282 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:22:08.250270 systemd[1]: Starting modprobe@loop.service... Jul 2 08:22:08.256784 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:22:08.256855 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:22:08.256919 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:22:08.258687 systemd[1]: Mounted usr-share-oem.mount. Jul 2 08:22:08.265871 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:22:08.265948 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:22:08.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.275002 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:22:08.275090 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:22:08.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.323615 kernel: audit: type=1130 audit(1719908528.274:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.323644 kernel: audit: type=1131 audit(1719908528.274:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.381971 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:22:08.382029 systemd[1]: Finished modprobe@loop.service. Jul 2 08:22:08.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.433630 kernel: audit: type=1130 audit(1719908528.381:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.433658 kernel: audit: type=1131 audit(1719908528.381:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.494983 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:22:08.495042 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:22:08.495494 systemd[1]: Finished systemd-sysext.service. Jul 2 08:22:08.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.504305 systemd[1]: Starting ensure-sysext.service... Jul 2 08:22:08.512238 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 08:22:08.521762 systemd[1]: Reloading. Jul 2 08:22:08.521773 systemd-tmpfiles[1401]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 08:22:08.524241 systemd-tmpfiles[1401]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 08:22:08.527825 systemd-tmpfiles[1401]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 08:22:08.541661 /usr/lib/systemd/system-generators/torcx-generator[1420]: time="2024-07-02T08:22:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:22:08.541677 /usr/lib/systemd/system-generators/torcx-generator[1420]: time="2024-07-02T08:22:08Z" level=info msg="torcx already run" Jul 2 08:22:08.594179 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:22:08.594186 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:22:08.605807 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:22:08.646000 audit: BPF prog-id=24 op=LOAD Jul 2 08:22:08.647000 audit: BPF prog-id=21 op=UNLOAD Jul 2 08:22:08.647000 audit: BPF prog-id=25 op=LOAD Jul 2 08:22:08.647000 audit: BPF prog-id=26 op=LOAD Jul 2 08:22:08.647000 audit: BPF prog-id=22 op=UNLOAD Jul 2 08:22:08.647000 audit: BPF prog-id=23 op=UNLOAD Jul 2 08:22:08.648000 audit: BPF prog-id=27 op=LOAD Jul 2 08:22:08.648000 audit: BPF prog-id=28 op=LOAD Jul 2 08:22:08.648000 audit: BPF prog-id=18 op=UNLOAD Jul 2 08:22:08.648000 audit: BPF prog-id=19 op=UNLOAD Jul 2 08:22:08.649000 audit: BPF prog-id=29 op=LOAD Jul 2 08:22:08.649000 audit: BPF prog-id=15 op=UNLOAD Jul 2 08:22:08.650000 audit: BPF prog-id=30 op=LOAD Jul 2 08:22:08.650000 audit: BPF prog-id=31 op=LOAD Jul 2 08:22:08.650000 audit: BPF prog-id=16 op=UNLOAD Jul 2 08:22:08.650000 audit: BPF prog-id=17 op=UNLOAD Jul 2 08:22:08.650000 audit: BPF prog-id=32 op=LOAD Jul 2 08:22:08.650000 audit: BPF prog-id=20 op=UNLOAD Jul 2 08:22:08.652815 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 08:22:08.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:08.663721 systemd[1]: Starting audit-rules.service... Jul 2 08:22:08.672160 systemd[1]: Starting clean-ca-certificates.service... Jul 2 08:22:08.681273 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 08:22:08.681000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 08:22:08.681000 audit[1498]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4bbcc970 a2=420 a3=0 items=0 ppid=1482 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:08.681000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 08:22:08.682507 augenrules[1498]: No rules Jul 2 08:22:08.690595 systemd[1]: Starting systemd-resolved.service... Jul 2 08:22:08.698802 systemd[1]: Starting systemd-timesyncd.service... Jul 2 08:22:08.706379 systemd[1]: Starting systemd-update-utmp.service... Jul 2 08:22:08.714129 systemd[1]: Finished audit-rules.service. Jul 2 08:22:08.720914 systemd[1]: Finished clean-ca-certificates.service. Jul 2 08:22:08.729974 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 08:22:08.751750 systemd[1]: Finished systemd-update-utmp.service. Jul 2 08:22:08.760223 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:22:08.760824 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:22:08.768189 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:22:08.775134 systemd[1]: Starting modprobe@loop.service... Jul 2 08:22:08.781196 systemd-resolved[1504]: Positive Trust Anchors: Jul 2 08:22:08.781203 systemd-resolved[1504]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 08:22:08.781222 systemd-resolved[1504]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 08:22:08.782691 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:22:08.782763 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:22:08.783471 systemd[1]: Starting systemd-update-done.service... Jul 2 08:22:08.785491 systemd-resolved[1504]: Using system hostname 'ci-3510.3.5-a-12d7dcb878'. Jul 2 08:22:08.791791 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 08:22:08.792294 systemd[1]: Started systemd-timesyncd.service. Jul 2 08:22:08.802002 systemd[1]: Started systemd-resolved.service. Jul 2 08:22:08.811948 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:22:08.812022 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:22:08.820966 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:22:08.821071 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:22:08.829997 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:22:08.830123 systemd[1]: Finished modprobe@loop.service. Jul 2 08:22:08.841669 systemd[1]: Finished systemd-update-done.service. Jul 2 08:22:08.854077 systemd[1]: Reached target network.target. Jul 2 08:22:08.863050 systemd[1]: Reached target nss-lookup.target. Jul 2 08:22:08.873101 systemd[1]: Reached target time-set.target. Jul 2 08:22:08.883012 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:22:08.883832 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:22:08.886714 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:22:08.896423 systemd[1]: Starting modprobe@drm.service... Jul 2 08:22:08.906406 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:22:08.916417 systemd[1]: Starting modprobe@loop.service... Jul 2 08:22:08.923985 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:22:08.924305 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:22:08.927299 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 08:22:08.935868 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 08:22:08.936190 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:22:08.939804 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:22:08.940129 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:22:08.949818 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 08:22:08.950121 systemd[1]: Finished modprobe@drm.service. Jul 2 08:22:08.959805 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:22:08.960108 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:22:08.969779 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:22:08.970084 systemd[1]: Finished modprobe@loop.service. Jul 2 08:22:08.981242 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:22:08.981435 systemd[1]: Reached target sysinit.target. Jul 2 08:22:08.990979 systemd[1]: Started motdgen.path. Jul 2 08:22:08.998892 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 08:22:09.009273 systemd[1]: Started logrotate.timer. Jul 2 08:22:09.018098 systemd[1]: Started mdadm.timer. Jul 2 08:22:09.024815 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 08:22:09.033870 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 08:22:09.033959 systemd[1]: Reached target paths.target. Jul 2 08:22:09.040789 systemd[1]: Reached target timers.target. Jul 2 08:22:09.048423 systemd[1]: Listening on dbus.socket. Jul 2 08:22:09.058255 systemd[1]: Starting docker.socket... Jul 2 08:22:09.070470 systemd[1]: Listening on sshd.socket. Jul 2 08:22:09.078153 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:22:09.078289 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:22:09.079904 systemd[1]: Finished ensure-sysext.service. Jul 2 08:22:09.089231 systemd[1]: Listening on docker.socket. Jul 2 08:22:09.098908 systemd[1]: Reached target sockets.target. Jul 2 08:22:09.107798 systemd[1]: Reached target basic.target. Jul 2 08:22:09.114912 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 08:22:09.114984 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 08:22:09.117370 systemd[1]: Starting containerd.service... Jul 2 08:22:09.127119 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 08:22:09.137712 systemd[1]: Starting coreos-metadata.service... Jul 2 08:22:09.145154 systemd[1]: Starting dbus.service... Jul 2 08:22:09.151229 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 08:22:09.155933 jq[1527]: false Jul 2 08:22:09.158167 systemd[1]: Starting extend-filesystems.service... Jul 2 08:22:09.164657 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 08:22:09.165468 systemd[1]: Starting motdgen.service... Jul 2 08:22:09.165584 dbus-daemon[1526]: [system] SELinux support is enabled Jul 2 08:22:09.166349 coreos-metadata[1520]: Jul 02 08:22:09.166 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 08:22:09.166965 coreos-metadata[1523]: Jul 02 08:22:09.166 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 08:22:09.167719 extend-filesystems[1528]: Found loop1 Jul 2 08:22:09.167719 extend-filesystems[1528]: Found sda Jul 2 08:22:09.167719 extend-filesystems[1528]: Found sda1 Jul 2 08:22:09.219800 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Jul 2 08:22:09.174552 systemd[1]: Starting prepare-helm.service... Jul 2 08:22:09.220305 extend-filesystems[1528]: Found sda2 Jul 2 08:22:09.220305 extend-filesystems[1528]: Found sda3 Jul 2 08:22:09.220305 extend-filesystems[1528]: Found usr Jul 2 08:22:09.220305 extend-filesystems[1528]: Found sda4 Jul 2 08:22:09.220305 extend-filesystems[1528]: Found sda6 Jul 2 08:22:09.220305 extend-filesystems[1528]: Found sda7 Jul 2 08:22:09.220305 extend-filesystems[1528]: Found sda9 Jul 2 08:22:09.220305 extend-filesystems[1528]: Checking size of /dev/sda9 Jul 2 08:22:09.220305 extend-filesystems[1528]: Resized partition /dev/sda9 Jul 2 08:22:09.214497 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 08:22:09.333817 extend-filesystems[1544]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 08:22:09.229271 systemd[1]: Starting sshd-keygen.service... Jul 2 08:22:09.350846 dbus-daemon[1526]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 08:22:09.247620 systemd[1]: Starting systemd-logind.service... Jul 2 08:22:09.256781 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:22:09.355996 update_engine[1557]: I0702 08:22:09.325984 1557 main.cc:92] Flatcar Update Engine starting Jul 2 08:22:09.355996 update_engine[1557]: I0702 08:22:09.329751 1557 update_check_scheduler.cc:74] Next update check in 9m18s Jul 2 08:22:09.259449 systemd[1]: Starting tcsd.service... Jul 2 08:22:09.356177 jq[1558]: true Jul 2 08:22:09.270833 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 08:22:09.271989 systemd[1]: Starting update-engine.service... Jul 2 08:22:09.356358 tar[1567]: linux-amd64/helm Jul 2 08:22:09.277936 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 08:22:09.356507 jq[1570]: true Jul 2 08:22:09.297912 systemd[1]: Started dbus.service. Jul 2 08:22:09.302987 systemd-logind[1554]: Watching system buttons on /dev/input/event3 (Power Button) Jul 2 08:22:09.302996 systemd-logind[1554]: Watching system buttons on /dev/input/event2 (Sleep Button) Jul 2 08:22:09.303006 systemd-logind[1554]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Jul 2 08:22:09.303178 systemd-logind[1554]: New seat seat0. Jul 2 08:22:09.313452 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 08:22:09.313554 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 08:22:09.313723 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 08:22:09.313801 systemd[1]: Finished motdgen.service. Jul 2 08:22:09.326111 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 08:22:09.326197 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 08:22:09.356926 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Jul 2 08:22:09.357053 systemd[1]: Condition check resulted in tcsd.service being skipped. Jul 2 08:22:09.357207 systemd[1]: Started systemd-logind.service. Jul 2 08:22:09.360094 env[1571]: time="2024-07-02T08:22:09.360070951Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 08:22:09.368409 env[1571]: time="2024-07-02T08:22:09.368361587Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 08:22:09.369726 systemd[1]: Started update-engine.service. Jul 2 08:22:09.369822 env[1571]: time="2024-07-02T08:22:09.369793687Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:22:09.370461 env[1571]: time="2024-07-02T08:22:09.370443267Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:22:09.370461 env[1571]: time="2024-07-02T08:22:09.370460441Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:22:09.372305 env[1571]: time="2024-07-02T08:22:09.372263546Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:22:09.372305 env[1571]: time="2024-07-02T08:22:09.372275780Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 08:22:09.372305 env[1571]: time="2024-07-02T08:22:09.372283771Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 08:22:09.372305 env[1571]: time="2024-07-02T08:22:09.372289239Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 08:22:09.372387 env[1571]: time="2024-07-02T08:22:09.372335446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:22:09.372503 env[1571]: time="2024-07-02T08:22:09.372493743Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:22:09.372581 env[1571]: time="2024-07-02T08:22:09.372570680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:22:09.374343 env[1571]: time="2024-07-02T08:22:09.372583605Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 08:22:09.374370 env[1571]: time="2024-07-02T08:22:09.374347783Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 08:22:09.374370 env[1571]: time="2024-07-02T08:22:09.374359582Z" level=info msg="metadata content store policy set" policy=shared Jul 2 08:22:09.376763 bash[1594]: Updated "/home/core/.ssh/authorized_keys" Jul 2 08:22:09.378791 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 08:22:09.380788 env[1571]: time="2024-07-02T08:22:09.380739109Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 08:22:09.380788 env[1571]: time="2024-07-02T08:22:09.380753669Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 08:22:09.380788 env[1571]: time="2024-07-02T08:22:09.380761224Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 08:22:09.380788 env[1571]: time="2024-07-02T08:22:09.380776446Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.380788 env[1571]: time="2024-07-02T08:22:09.380784730Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.380887 env[1571]: time="2024-07-02T08:22:09.380793210Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.380887 env[1571]: time="2024-07-02T08:22:09.380800445Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.380887 env[1571]: time="2024-07-02T08:22:09.380807523Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.380887 env[1571]: time="2024-07-02T08:22:09.380814588Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.380887 env[1571]: time="2024-07-02T08:22:09.380821417Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.380887 env[1571]: time="2024-07-02T08:22:09.380827788Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.380887 env[1571]: time="2024-07-02T08:22:09.380836846Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 08:22:09.380990 env[1571]: time="2024-07-02T08:22:09.380887896Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 08:22:09.380990 env[1571]: time="2024-07-02T08:22:09.380935786Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 08:22:09.381095 env[1571]: time="2024-07-02T08:22:09.381057675Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 08:22:09.381095 env[1571]: time="2024-07-02T08:22:09.381071724Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381095 env[1571]: time="2024-07-02T08:22:09.381079032Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381105235Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381112964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381119459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381125699Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381132623Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381138726Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381144997Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381151713Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381161 env[1571]: time="2024-07-02T08:22:09.381158852Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 08:22:09.381294 env[1571]: time="2024-07-02T08:22:09.381219229Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381294 env[1571]: time="2024-07-02T08:22:09.381229797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381294 env[1571]: time="2024-07-02T08:22:09.381237008Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381294 env[1571]: time="2024-07-02T08:22:09.381242832Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 08:22:09.381294 env[1571]: time="2024-07-02T08:22:09.381250476Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 08:22:09.381294 env[1571]: time="2024-07-02T08:22:09.381256535Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 08:22:09.381294 env[1571]: time="2024-07-02T08:22:09.381268564Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 08:22:09.381468 env[1571]: time="2024-07-02T08:22:09.381450259Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 08:22:09.381772 env[1571]: time="2024-07-02T08:22:09.381707714Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 08:22:09.381772 env[1571]: time="2024-07-02T08:22:09.381743745Z" level=info msg="Connect containerd service" Jul 2 08:22:09.381772 env[1571]: time="2024-07-02T08:22:09.381765024Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382051755Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382130416Z" level=info msg="Start subscribing containerd event" Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382177343Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382189024Z" level=info msg="Start recovering state" Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382203909Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382226018Z" level=info msg="Start event monitor" Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382226159Z" level=info msg="containerd successfully booted in 0.022708s" Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382241408Z" level=info msg="Start snapshots syncer" Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382257333Z" level=info msg="Start cni network conf syncer for default" Jul 2 08:22:09.383421 env[1571]: time="2024-07-02T08:22:09.382266205Z" level=info msg="Start streaming server" Jul 2 08:22:09.389684 systemd[1]: Started containerd.service. Jul 2 08:22:09.399545 systemd[1]: Started locksmithd.service. Jul 2 08:22:09.406703 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 08:22:09.406787 systemd[1]: Reached target system-config.target. Jul 2 08:22:09.414655 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 08:22:09.414737 systemd[1]: Reached target user-config.target. Jul 2 08:22:09.424342 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 08:22:09.433749 systemd[1]: Reached target network-online.target. Jul 2 08:22:09.442589 systemd[1]: Starting kubelet.service... Jul 2 08:22:09.459740 locksmithd[1610]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 08:22:09.552061 sshd_keygen[1555]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 08:22:09.563766 systemd[1]: Finished sshd-keygen.service. Jul 2 08:22:09.571574 systemd[1]: Starting issuegen.service... Jul 2 08:22:09.578974 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 08:22:09.579054 systemd[1]: Finished issuegen.service. Jul 2 08:22:09.586673 systemd[1]: Starting systemd-user-sessions.service... Jul 2 08:22:09.594918 systemd[1]: Finished systemd-user-sessions.service. Jul 2 08:22:09.602244 tar[1567]: linux-amd64/LICENSE Jul 2 08:22:09.602287 tar[1567]: linux-amd64/README.md Jul 2 08:22:09.605173 systemd[1]: Started getty@tty1.service. Jul 2 08:22:09.613364 systemd[1]: Started serial-getty@ttyS1.service. Jul 2 08:22:09.622782 systemd[1]: Reached target getty.target. Jul 2 08:22:09.631070 systemd[1]: Finished prepare-helm.service. Jul 2 08:22:09.779638 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Jul 2 08:22:09.812585 extend-filesystems[1544]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Jul 2 08:22:09.812585 extend-filesystems[1544]: old_desc_blocks = 1, new_desc_blocks = 56 Jul 2 08:22:09.812585 extend-filesystems[1544]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Jul 2 08:22:09.852689 extend-filesystems[1528]: Resized filesystem in /dev/sda9 Jul 2 08:22:09.852689 extend-filesystems[1528]: Found sdb Jul 2 08:22:09.813197 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 08:22:09.813299 systemd[1]: Finished extend-filesystems.service. Jul 2 08:22:09.987617 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Jul 2 08:22:10.187585 systemd[1]: Started kubelet.service. Jul 2 08:22:10.806213 kubelet[1637]: E0702 08:22:10.806158 1637 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:22:10.807404 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:22:10.807492 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:22:14.634810 login[1633]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 08:22:14.641753 login[1632]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 08:22:14.643864 systemd-logind[1554]: New session 1 of user core. Jul 2 08:22:14.644685 systemd[1]: Created slice user-500.slice. Jul 2 08:22:14.645355 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 08:22:14.646648 systemd-logind[1554]: New session 2 of user core. Jul 2 08:22:14.650972 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 08:22:14.651801 systemd[1]: Starting user@500.service... Jul 2 08:22:14.653689 (systemd)[1655]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:22:14.852405 systemd[1655]: Queued start job for default target default.target. Jul 2 08:22:14.852660 systemd[1655]: Reached target paths.target. Jul 2 08:22:14.852671 systemd[1655]: Reached target sockets.target. Jul 2 08:22:14.852679 systemd[1655]: Reached target timers.target. Jul 2 08:22:14.852686 systemd[1655]: Reached target basic.target. Jul 2 08:22:14.852705 systemd[1655]: Reached target default.target. Jul 2 08:22:14.852720 systemd[1655]: Startup finished in 195ms. Jul 2 08:22:14.852755 systemd[1]: Started user@500.service. Jul 2 08:22:14.853472 systemd[1]: Started session-1.scope. Jul 2 08:22:14.853973 systemd[1]: Started session-2.scope. Jul 2 08:22:14.910426 coreos-metadata[1520]: Jul 02 08:22:14.910 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jul 2 08:22:14.910739 coreos-metadata[1523]: Jul 02 08:22:14.910 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jul 2 08:22:15.179476 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Jul 2 08:22:15.179639 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Jul 2 08:22:15.910866 coreos-metadata[1520]: Jul 02 08:22:15.910 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jul 2 08:22:15.911831 coreos-metadata[1523]: Jul 02 08:22:15.910 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jul 2 08:22:15.943214 systemd[1]: Created slice system-sshd.slice. Jul 2 08:22:15.943811 systemd[1]: Started sshd@0-147.75.203.89:22-139.178.68.195:51592.service. Jul 2 08:22:15.958892 coreos-metadata[1523]: Jul 02 08:22:15.958 INFO Fetch successful Jul 2 08:22:15.958928 coreos-metadata[1520]: Jul 02 08:22:15.958 INFO Fetch successful Jul 2 08:22:15.983379 systemd[1]: Finished coreos-metadata.service. Jul 2 08:22:15.984346 systemd[1]: Started packet-phone-home.service. Jul 2 08:22:15.985320 unknown[1520]: wrote ssh authorized keys file for user: core Jul 2 08:22:15.990397 curl[1680]: % Total % Received % Xferd Average Speed Time Time Time Current Jul 2 08:22:15.990557 curl[1680]: Dload Upload Total Spent Left Speed Jul 2 08:22:15.995809 sshd[1676]: Accepted publickey for core from 139.178.68.195 port 51592 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:22:15.996289 update-ssh-keys[1681]: Updated "/home/core/.ssh/authorized_keys" Jul 2 08:22:15.996524 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 08:22:15.996541 sshd[1676]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:22:15.996781 systemd[1]: Reached target multi-user.target. Jul 2 08:22:15.997390 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 08:22:15.999674 systemd-logind[1554]: New session 3 of user core. Jul 2 08:22:16.001130 systemd[1]: Started session-3.scope. Jul 2 08:22:16.001906 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 08:22:16.001975 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 08:22:16.002085 systemd[1]: Startup finished in 2.023s (kernel) + 17.014s (initrd) + 14.146s (userspace) = 33.184s. Jul 2 08:22:16.048630 systemd[1]: Started sshd@1-147.75.203.89:22-139.178.68.195:51604.service. Jul 2 08:22:16.083747 sshd[1687]: Accepted publickey for core from 139.178.68.195 port 51604 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:22:16.084428 sshd[1687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:22:16.086856 systemd-logind[1554]: New session 4 of user core. Jul 2 08:22:16.087271 systemd[1]: Started session-4.scope. Jul 2 08:22:16.140312 sshd[1687]: pam_unix(sshd:session): session closed for user core Jul 2 08:22:16.141813 systemd[1]: sshd@1-147.75.203.89:22-139.178.68.195:51604.service: Deactivated successfully. Jul 2 08:22:16.142139 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 08:22:16.142449 systemd-logind[1554]: Session 4 logged out. Waiting for processes to exit. Jul 2 08:22:16.143011 systemd[1]: Started sshd@2-147.75.203.89:22-139.178.68.195:51620.service. Jul 2 08:22:16.143461 systemd-logind[1554]: Removed session 4. Jul 2 08:22:16.178592 sshd[1693]: Accepted publickey for core from 139.178.68.195 port 51620 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:22:16.179388 sshd[1693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:22:16.182379 systemd-logind[1554]: New session 5 of user core. Jul 2 08:22:16.182940 systemd[1]: Started session-5.scope. Jul 2 08:22:16.211344 curl[1680]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Jul 2 08:22:16.213413 systemd[1]: packet-phone-home.service: Deactivated successfully. Jul 2 08:22:16.236602 sshd[1693]: pam_unix(sshd:session): session closed for user core Jul 2 08:22:16.243240 systemd[1]: sshd@2-147.75.203.89:22-139.178.68.195:51620.service: Deactivated successfully. Jul 2 08:22:16.244762 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 08:22:16.246453 systemd-logind[1554]: Session 5 logged out. Waiting for processes to exit. Jul 2 08:22:16.249008 systemd[1]: Started sshd@3-147.75.203.89:22-139.178.68.195:51622.service. Jul 2 08:22:16.251313 systemd-logind[1554]: Removed session 5. Jul 2 08:22:16.298884 systemd-timesyncd[1505]: Contacted time server 23.150.41.123:123 (0.flatcar.pool.ntp.org). Jul 2 08:22:16.299022 systemd-timesyncd[1505]: Initial clock synchronization to Tue 2024-07-02 08:22:16.427560 UTC. Jul 2 08:22:16.350568 sshd[1699]: Accepted publickey for core from 139.178.68.195 port 51622 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:22:16.352368 sshd[1699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:22:16.357952 systemd-logind[1554]: New session 6 of user core. Jul 2 08:22:16.359123 systemd[1]: Started session-6.scope. Jul 2 08:22:16.429898 sshd[1699]: pam_unix(sshd:session): session closed for user core Jul 2 08:22:16.436472 systemd[1]: sshd@3-147.75.203.89:22-139.178.68.195:51622.service: Deactivated successfully. Jul 2 08:22:16.438060 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 08:22:16.439691 systemd-logind[1554]: Session 6 logged out. Waiting for processes to exit. Jul 2 08:22:16.442293 systemd[1]: Started sshd@4-147.75.203.89:22-139.178.68.195:51632.service. Jul 2 08:22:16.444985 systemd-logind[1554]: Removed session 6. Jul 2 08:22:16.546103 sshd[1705]: Accepted publickey for core from 139.178.68.195 port 51632 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:22:16.547917 sshd[1705]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:22:16.553464 systemd-logind[1554]: New session 7 of user core. Jul 2 08:22:16.554693 systemd[1]: Started session-7.scope. Jul 2 08:22:16.640543 sudo[1708]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 08:22:16.641251 sudo[1708]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:22:16.663986 dbus-daemon[1526]: н\xe3(UV: received setenforce notice (enforcing=-1809261680) Jul 2 08:22:16.668303 sudo[1708]: pam_unix(sudo:session): session closed for user root Jul 2 08:22:16.672804 sshd[1705]: pam_unix(sshd:session): session closed for user core Jul 2 08:22:16.679697 systemd[1]: sshd@4-147.75.203.89:22-139.178.68.195:51632.service: Deactivated successfully. Jul 2 08:22:16.681336 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 08:22:16.683028 systemd-logind[1554]: Session 7 logged out. Waiting for processes to exit. Jul 2 08:22:16.685674 systemd[1]: Started sshd@5-147.75.203.89:22-139.178.68.195:51648.service. Jul 2 08:22:16.688039 systemd-logind[1554]: Removed session 7. Jul 2 08:22:16.790285 sshd[1712]: Accepted publickey for core from 139.178.68.195 port 51648 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:22:16.792121 sshd[1712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:22:16.797621 systemd-logind[1554]: New session 8 of user core. Jul 2 08:22:16.798838 systemd[1]: Started session-8.scope. Jul 2 08:22:16.866019 sudo[1716]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 08:22:16.866711 sudo[1716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:22:16.873982 sudo[1716]: pam_unix(sudo:session): session closed for user root Jul 2 08:22:16.886924 sudo[1715]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 08:22:16.887637 sudo[1715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:22:16.901074 systemd[1]: Stopping audit-rules.service... Jul 2 08:22:16.901000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 08:22:16.901994 auditctl[1719]: No rules Jul 2 08:22:16.902136 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 08:22:16.902212 systemd[1]: Stopped audit-rules.service. Jul 2 08:22:16.902997 systemd[1]: Starting audit-rules.service... Jul 2 08:22:16.907290 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 2 08:22:16.907317 kernel: audit: type=1305 audit(1719908536.901:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 08:22:16.912475 augenrules[1736]: No rules Jul 2 08:22:16.912798 systemd[1]: Finished audit-rules.service. Jul 2 08:22:16.913245 sudo[1715]: pam_unix(sudo:session): session closed for user root Jul 2 08:22:16.914057 sshd[1712]: pam_unix(sshd:session): session closed for user core Jul 2 08:22:16.915991 systemd[1]: Started sshd@6-147.75.203.89:22-139.178.68.195:51650.service. Jul 2 08:22:16.916292 systemd[1]: sshd@5-147.75.203.89:22-139.178.68.195:51648.service: Deactivated successfully. Jul 2 08:22:16.916628 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 08:22:16.917013 systemd-logind[1554]: Session 8 logged out. Waiting for processes to exit. Jul 2 08:22:16.917527 systemd-logind[1554]: Removed session 8. Jul 2 08:22:16.901000 audit[1719]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1efc2a00 a2=420 a3=0 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:16.953885 kernel: audit: type=1300 audit(1719908536.901:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1efc2a00 a2=420 a3=0 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:16.953912 kernel: audit: type=1327 audit(1719908536.901:184): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 08:22:16.901000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 08:22:16.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:16.983250 sshd[1741]: Accepted publickey for core from 139.178.68.195 port 51650 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:22:16.984891 sshd[1741]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:22:16.985814 kernel: audit: type=1131 audit(1719908536.901:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:16.985837 kernel: audit: type=1130 audit(1719908536.912:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:16.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:16.987185 systemd-logind[1554]: New session 9 of user core. Jul 2 08:22:16.987551 systemd[1]: Started session-9.scope. Jul 2 08:22:17.008431 kernel: audit: type=1106 audit(1719908536.912:187): pid=1715 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:16.912000 audit[1715]: USER_END pid=1715 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:17.034674 sudo[1745]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 08:22:17.034816 kernel: audit: type=1104 audit(1719908536.912:188): pid=1715 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:16.912000 audit[1715]: CRED_DISP pid=1715 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:17.034803 sudo[1745]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:22:17.046931 systemd[1]: Starting docker.service... Jul 2 08:22:17.058722 kernel: audit: type=1106 audit(1719908536.914:189): pid=1712 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:16.914000 audit[1712]: USER_END pid=1712 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:17.064088 env[1759]: time="2024-07-02T08:22:17.064035287Z" level=info msg="Starting up" Jul 2 08:22:17.065045 env[1759]: time="2024-07-02T08:22:17.064991635Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 08:22:17.065045 env[1759]: time="2024-07-02T08:22:17.065017598Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 08:22:17.065045 env[1759]: time="2024-07-02T08:22:17.065039918Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 08:22:17.065116 env[1759]: time="2024-07-02T08:22:17.065052861Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 08:22:17.066045 env[1759]: time="2024-07-02T08:22:17.065995607Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 08:22:17.066045 env[1759]: time="2024-07-02T08:22:17.066014470Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 08:22:17.066045 env[1759]: time="2024-07-02T08:22:17.066035307Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 08:22:17.066115 env[1759]: time="2024-07-02T08:22:17.066053491Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 08:22:17.091488 kernel: audit: type=1104 audit(1719908536.914:190): pid=1712 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:16.914000 audit[1712]: CRED_DISP pid=1712 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:16.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.203.89:22-139.178.68.195:51650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:17.143736 kernel: audit: type=1130 audit(1719908536.915:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.203.89:22-139.178.68.195:51650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:16.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.203.89:22-139.178.68.195:51648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:16.982000 audit[1741]: USER_ACCT pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:16.984000 audit[1741]: CRED_ACQ pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:16.984000 audit[1741]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef7873240 a2=3 a3=0 items=0 ppid=1 pid=1741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:16.984000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:22:16.989000 audit[1741]: USER_START pid=1741 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:16.989000 audit[1744]: CRED_ACQ pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:17.034000 audit[1745]: USER_ACCT pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:17.034000 audit[1745]: CRED_REFR pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:17.035000 audit[1745]: USER_START pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:17.234266 env[1759]: time="2024-07-02T08:22:17.234136495Z" level=info msg="Loading containers: start." Jul 2 08:22:17.319000 audit[1815]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.319000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd51f24630 a2=0 a3=7ffd51f2461c items=0 ppid=1759 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 08:22:17.320000 audit[1817]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.320000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe62cc3920 a2=0 a3=7ffe62cc390c items=0 ppid=1759 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 08:22:17.321000 audit[1819]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.321000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdff6300c0 a2=0 a3=7ffdff6300ac items=0 ppid=1759 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.321000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 08:22:17.322000 audit[1821]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.322000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe3eb56360 a2=0 a3=7ffe3eb5634c items=0 ppid=1759 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 08:22:17.324000 audit[1823]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.324000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe27292060 a2=0 a3=7ffe2729204c items=0 ppid=1759 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 08:22:17.353000 audit[1828]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.353000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0ca24fd0 a2=0 a3=7ffe0ca24fbc items=0 ppid=1759 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.353000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 08:22:17.357000 audit[1830]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.357000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc56ef0830 a2=0 a3=7ffc56ef081c items=0 ppid=1759 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.357000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 08:22:17.359000 audit[1832]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.359000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcafad7810 a2=0 a3=7ffcafad77fc items=0 ppid=1759 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 08:22:17.360000 audit[1834]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.360000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc63f5d7b0 a2=0 a3=7ffc63f5d79c items=0 ppid=1759 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 08:22:17.365000 audit[1838]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.365000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffecfa29360 a2=0 a3=7ffecfa2934c items=0 ppid=1759 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 08:22:17.365000 audit[1839]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.365000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe202c2e90 a2=0 a3=7ffe202c2e7c items=0 ppid=1759 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 08:22:17.381637 kernel: Initializing XFRM netlink socket Jul 2 08:22:17.425698 env[1759]: time="2024-07-02T08:22:17.425651883Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 08:22:17.436000 audit[1847]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.436000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffd976f3a0 a2=0 a3=7fffd976f38c items=0 ppid=1759 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 08:22:17.449000 audit[1850]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.449000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdecf1daa0 a2=0 a3=7ffdecf1da8c items=0 ppid=1759 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 08:22:17.451000 audit[1853]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.451000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe9d3101a0 a2=0 a3=7ffe9d31018c items=0 ppid=1759 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.451000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 08:22:17.452000 audit[1855]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.452000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdcf74d7d0 a2=0 a3=7ffdcf74d7bc items=0 ppid=1759 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.452000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 08:22:17.453000 audit[1857]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.453000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc8f4ff3d0 a2=0 a3=7ffc8f4ff3bc items=0 ppid=1759 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.453000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 08:22:17.454000 audit[1859]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.454000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc5882e920 a2=0 a3=7ffc5882e90c items=0 ppid=1759 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.454000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 08:22:17.455000 audit[1861]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.455000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcdcdf2d50 a2=0 a3=7ffcdcdf2d3c items=0 ppid=1759 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.455000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 08:22:17.460000 audit[1864]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.460000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffda47e76f0 a2=0 a3=7ffda47e76dc items=0 ppid=1759 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.460000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 08:22:17.462000 audit[1866]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.462000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc7e443ce0 a2=0 a3=7ffc7e443ccc items=0 ppid=1759 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.462000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 08:22:17.463000 audit[1868]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.463000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff68fde280 a2=0 a3=7fff68fde26c items=0 ppid=1759 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 08:22:17.464000 audit[1870]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.464000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffda3eaa5e0 a2=0 a3=7ffda3eaa5cc items=0 ppid=1759 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.464000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 08:22:17.466020 systemd-networkd[1315]: docker0: Link UP Jul 2 08:22:17.468000 audit[1874]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.468000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe20155db0 a2=0 a3=7ffe20155d9c items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 08:22:17.468000 audit[1875]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:17.468000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc5b024e30 a2=0 a3=7ffc5b024e1c items=0 ppid=1759 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:17.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 08:22:17.470484 env[1759]: time="2024-07-02T08:22:17.470471790Z" level=info msg="Loading containers: done." Jul 2 08:22:17.478075 env[1759]: time="2024-07-02T08:22:17.478056597Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 08:22:17.478176 env[1759]: time="2024-07-02T08:22:17.478164647Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 08:22:17.478240 env[1759]: time="2024-07-02T08:22:17.478230743Z" level=info msg="Daemon has completed initialization" Jul 2 08:22:17.485223 systemd[1]: Started docker.service. Jul 2 08:22:17.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:17.488476 env[1759]: time="2024-07-02T08:22:17.488454347Z" level=info msg="API listen on /run/docker.sock" Jul 2 08:22:18.490027 env[1571]: time="2024-07-02T08:22:18.489883872Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\"" Jul 2 08:22:19.124530 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1566651522.mount: Deactivated successfully. Jul 2 08:22:20.316628 env[1571]: time="2024-07-02T08:22:20.316552536Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:20.317228 env[1571]: time="2024-07-02T08:22:20.317177381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:20.318668 env[1571]: time="2024-07-02T08:22:20.318610965Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:20.319532 env[1571]: time="2024-07-02T08:22:20.319472554Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:340ab4a1d66a60630a7a298aa0b2576fcd82e51ecdddb751cf61e5d3846fde2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:20.319999 env[1571]: time="2024-07-02T08:22:20.319948538Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\" returns image reference \"sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe\"" Jul 2 08:22:20.327026 env[1571]: time="2024-07-02T08:22:20.326968457Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\"" Jul 2 08:22:21.001011 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 08:22:21.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:21.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:21.001514 systemd[1]: Stopped kubelet.service. Jul 2 08:22:21.004841 systemd[1]: Starting kubelet.service... Jul 2 08:22:21.261478 systemd[1]: Started kubelet.service. Jul 2 08:22:21.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:21.284358 kubelet[1950]: E0702 08:22:21.284335 1950 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:22:21.286276 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:22:21.286349 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:22:21.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 08:22:21.842875 env[1571]: time="2024-07-02T08:22:21.842820365Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:21.843403 env[1571]: time="2024-07-02T08:22:21.843348481Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:21.844840 env[1571]: time="2024-07-02T08:22:21.844799260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:21.845661 env[1571]: time="2024-07-02T08:22:21.845578921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4c412bc1fc585ddeba10d34a02e7507ea787ec2c57256d4c18fd230377ab048e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:21.846116 env[1571]: time="2024-07-02T08:22:21.846065223Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\" returns image reference \"sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974\"" Jul 2 08:22:21.852027 env[1571]: time="2024-07-02T08:22:21.851927245Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\"" Jul 2 08:22:22.999878 env[1571]: time="2024-07-02T08:22:22.999821541Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:23.000477 env[1571]: time="2024-07-02T08:22:23.000421241Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:23.001541 env[1571]: time="2024-07-02T08:22:23.001500359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:23.002765 env[1571]: time="2024-07-02T08:22:23.002726452Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:0ed75a333704f5d315395c6ec04d7af7405715537069b65d40b43ec1c8e030bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:23.003784 env[1571]: time="2024-07-02T08:22:23.003733153Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\" returns image reference \"sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940\"" Jul 2 08:22:23.009140 env[1571]: time="2024-07-02T08:22:23.009095124Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 08:22:23.972687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount994556079.mount: Deactivated successfully. Jul 2 08:22:24.330393 env[1571]: time="2024-07-02T08:22:24.330340646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:24.330996 env[1571]: time="2024-07-02T08:22:24.330940386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:24.331739 env[1571]: time="2024-07-02T08:22:24.331700014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:24.332453 env[1571]: time="2024-07-02T08:22:24.332413807Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:24.332759 env[1571]: time="2024-07-02T08:22:24.332712780Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772\"" Jul 2 08:22:24.338711 env[1571]: time="2024-07-02T08:22:24.338696487Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 08:22:24.933339 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount215377368.mount: Deactivated successfully. Jul 2 08:22:25.635023 env[1571]: time="2024-07-02T08:22:25.634997385Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:25.635700 env[1571]: time="2024-07-02T08:22:25.635671057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:25.636799 env[1571]: time="2024-07-02T08:22:25.636754125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:25.637890 env[1571]: time="2024-07-02T08:22:25.637863367Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:25.638370 env[1571]: time="2024-07-02T08:22:25.638342827Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Jul 2 08:22:25.644187 env[1571]: time="2024-07-02T08:22:25.644172079Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 08:22:26.176914 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3302532002.mount: Deactivated successfully. Jul 2 08:22:26.195841 env[1571]: time="2024-07-02T08:22:26.195773376Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:26.199125 env[1571]: time="2024-07-02T08:22:26.198982905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:26.204227 env[1571]: time="2024-07-02T08:22:26.204122920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:26.207809 env[1571]: time="2024-07-02T08:22:26.207716780Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:26.209544 env[1571]: time="2024-07-02T08:22:26.209416303Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 08:22:26.223178 env[1571]: time="2024-07-02T08:22:26.223148588Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Jul 2 08:22:26.730695 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2975708083.mount: Deactivated successfully. Jul 2 08:22:28.391850 env[1571]: time="2024-07-02T08:22:28.391777436Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:28.392493 env[1571]: time="2024-07-02T08:22:28.392451449Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:28.393518 env[1571]: time="2024-07-02T08:22:28.393468650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:28.394722 env[1571]: time="2024-07-02T08:22:28.394674757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:28.395666 env[1571]: time="2024-07-02T08:22:28.395572852Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Jul 2 08:22:30.181841 systemd[1]: Stopped kubelet.service. Jul 2 08:22:30.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:30.183094 systemd[1]: Starting kubelet.service... Jul 2 08:22:30.187520 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 08:22:30.187565 kernel: audit: type=1130 audit(1719908550.181:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:30.194850 systemd[1]: Reloading. Jul 2 08:22:30.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:30.229164 /usr/lib/systemd/system-generators/torcx-generator[2140]: time="2024-07-02T08:22:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:22:30.229179 /usr/lib/systemd/system-generators/torcx-generator[2140]: time="2024-07-02T08:22:30Z" level=info msg="torcx already run" Jul 2 08:22:30.265118 kernel: audit: type=1131 audit(1719908550.181:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:30.284834 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:22:30.284842 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:22:30.296025 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.453120 kernel: audit: type=1400 audit(1719908550.341:232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.453192 kernel: audit: type=1400 audit(1719908550.341:233): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.453209 kernel: audit: type=1400 audit(1719908550.341:234): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510461 kernel: audit: type=1400 audit(1719908550.341:235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.569998 kernel: audit: type=1400 audit(1719908550.341:236): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.630234 kernel: audit: type=1400 audit(1719908550.341:237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.691753 kernel: audit: type=1400 audit(1719908550.341:238): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.754192 kernel: audit: type=1400 audit(1719908550.341:239): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.509000 audit: BPF prog-id=40 op=LOAD Jul 2 08:22:30.509000 audit: BPF prog-id=34 op=UNLOAD Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit: BPF prog-id=41 op=LOAD Jul 2 08:22:30.690000 audit: BPF prog-id=35 op=UNLOAD Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit: BPF prog-id=42 op=LOAD Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.817000 audit: BPF prog-id=43 op=LOAD Jul 2 08:22:30.817000 audit: BPF prog-id=36 op=UNLOAD Jul 2 08:22:30.817000 audit: BPF prog-id=37 op=UNLOAD Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit: BPF prog-id=44 op=LOAD Jul 2 08:22:30.818000 audit: BPF prog-id=33 op=UNLOAD Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit: BPF prog-id=45 op=LOAD Jul 2 08:22:30.818000 audit: BPF prog-id=24 op=UNLOAD Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit: BPF prog-id=46 op=LOAD Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.818000 audit: BPF prog-id=47 op=LOAD Jul 2 08:22:30.819000 audit: BPF prog-id=25 op=UNLOAD Jul 2 08:22:30.819000 audit: BPF prog-id=26 op=UNLOAD Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit: BPF prog-id=48 op=LOAD Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit: BPF prog-id=49 op=LOAD Jul 2 08:22:30.820000 audit: BPF prog-id=27 op=UNLOAD Jul 2 08:22:30.820000 audit: BPF prog-id=28 op=UNLOAD Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.821000 audit: BPF prog-id=50 op=LOAD Jul 2 08:22:30.821000 audit: BPF prog-id=38 op=UNLOAD Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit: BPF prog-id=51 op=LOAD Jul 2 08:22:30.822000 audit: BPF prog-id=29 op=UNLOAD Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit: BPF prog-id=52 op=LOAD Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.822000 audit: BPF prog-id=53 op=LOAD Jul 2 08:22:30.822000 audit: BPF prog-id=30 op=UNLOAD Jul 2 08:22:30.822000 audit: BPF prog-id=31 op=UNLOAD Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:30.823000 audit: BPF prog-id=54 op=LOAD Jul 2 08:22:30.823000 audit: BPF prog-id=32 op=UNLOAD Jul 2 08:22:30.830306 systemd[1]: Started kubelet.service. Jul 2 08:22:30.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:30.831051 systemd[1]: Stopping kubelet.service... Jul 2 08:22:30.831191 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 08:22:30.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:30.831280 systemd[1]: Stopped kubelet.service. Jul 2 08:22:30.832006 systemd[1]: Starting kubelet.service... Jul 2 08:22:31.009605 systemd[1]: Started kubelet.service. Jul 2 08:22:31.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:31.047086 kubelet[2208]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 08:22:31.047086 kubelet[2208]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 08:22:31.047086 kubelet[2208]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 08:22:31.049387 kubelet[2208]: I0702 08:22:31.049339 2208 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 08:22:31.240098 kubelet[2208]: I0702 08:22:31.240063 2208 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 08:22:31.240098 kubelet[2208]: I0702 08:22:31.240074 2208 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 08:22:31.240239 kubelet[2208]: I0702 08:22:31.240204 2208 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 08:22:31.250371 kubelet[2208]: I0702 08:22:31.250330 2208 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 08:22:31.256460 kubelet[2208]: E0702 08:22:31.256449 2208 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.203.89:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.281281 kubelet[2208]: I0702 08:22:31.281218 2208 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 08:22:31.281850 kubelet[2208]: I0702 08:22:31.281805 2208 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 08:22:31.281949 kubelet[2208]: I0702 08:22:31.281824 2208 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.5-a-12d7dcb878","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 08:22:31.281949 kubelet[2208]: I0702 08:22:31.281929 2208 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 08:22:31.281949 kubelet[2208]: I0702 08:22:31.281935 2208 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 08:22:31.282065 kubelet[2208]: I0702 08:22:31.281992 2208 state_mem.go:36] "Initialized new in-memory state store" Jul 2 08:22:31.282709 kubelet[2208]: I0702 08:22:31.282674 2208 kubelet.go:400] "Attempting to sync node with API server" Jul 2 08:22:31.282709 kubelet[2208]: I0702 08:22:31.282685 2208 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 08:22:31.282709 kubelet[2208]: I0702 08:22:31.282698 2208 kubelet.go:312] "Adding apiserver pod source" Jul 2 08:22:31.282709 kubelet[2208]: I0702 08:22:31.282707 2208 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 08:22:31.283010 kubelet[2208]: W0702 08:22:31.282961 2208 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://147.75.203.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.283010 kubelet[2208]: E0702 08:22:31.282994 2208 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.203.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.283010 kubelet[2208]: W0702 08:22:31.282985 2208 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://147.75.203.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-12d7dcb878&limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.283010 kubelet[2208]: E0702 08:22:31.283009 2208 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.203.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-12d7dcb878&limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.289528 kubelet[2208]: I0702 08:22:31.289519 2208 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 08:22:31.293723 kubelet[2208]: I0702 08:22:31.293685 2208 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 08:22:31.293723 kubelet[2208]: W0702 08:22:31.293717 2208 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 08:22:31.294060 kubelet[2208]: I0702 08:22:31.294020 2208 server.go:1264] "Started kubelet" Jul 2 08:22:31.294060 kubelet[2208]: I0702 08:22:31.294052 2208 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 08:22:31.294180 kubelet[2208]: I0702 08:22:31.294103 2208 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 08:22:31.294343 kubelet[2208]: I0702 08:22:31.294301 2208 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 08:22:31.294000 audit[2208]: AVC avc: denied { mac_admin } for pid=2208 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:31.294000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:22:31.294000 audit[2208]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a88c30 a1=c000a86738 a2=c000a88c00 a3=25 items=0 ppid=1 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.294000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:22:31.294000 audit[2208]: AVC avc: denied { mac_admin } for pid=2208 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:31.294000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:22:31.294000 audit[2208]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004ac5a0 a1=c000a86750 a2=c000a88cc0 a3=25 items=0 ppid=1 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.294000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:22:31.295043 kubelet[2208]: I0702 08:22:31.294645 2208 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 08:22:31.295043 kubelet[2208]: I0702 08:22:31.294666 2208 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 08:22:31.295043 kubelet[2208]: I0702 08:22:31.294697 2208 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 08:22:31.295043 kubelet[2208]: I0702 08:22:31.294747 2208 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 08:22:31.295043 kubelet[2208]: I0702 08:22:31.294777 2208 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 08:22:31.295043 kubelet[2208]: I0702 08:22:31.294818 2208 reconciler.go:26] "Reconciler: start to sync state" Jul 2 08:22:31.295043 kubelet[2208]: I0702 08:22:31.294831 2208 server.go:455] "Adding debug handlers to kubelet server" Jul 2 08:22:31.309020 kubelet[2208]: E0702 08:22:31.308987 2208 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-12d7dcb878?timeout=10s\": dial tcp 147.75.203.89:6443: connect: connection refused" interval="200ms" Jul 2 08:22:31.309102 kubelet[2208]: W0702 08:22:31.309005 2208 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://147.75.203.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.309145 kubelet[2208]: E0702 08:22:31.309131 2208 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.203.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.309188 kubelet[2208]: I0702 08:22:31.309158 2208 factory.go:221] Registration of the systemd container factory successfully Jul 2 08:22:31.309318 kubelet[2208]: I0702 08:22:31.309257 2208 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 08:22:31.309000 audit[2233]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:31.309000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc197220b0 a2=0 a3=7ffc1972209c items=0 ppid=2208 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 08:22:31.310000 audit[2234]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:31.310000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc06437b40 a2=0 a3=7ffc06437b2c items=0 ppid=2208 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 08:22:31.311000 audit[2236]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:31.311000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9656df40 a2=0 a3=7ffc9656df2c items=0 ppid=2208 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:22:31.312611 kubelet[2208]: I0702 08:22:31.312597 2208 factory.go:221] Registration of the containerd container factory successfully Jul 2 08:22:31.312699 kubelet[2208]: E0702 08:22:31.312681 2208 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 08:22:31.312732 kubelet[2208]: E0702 08:22:31.312647 2208 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://147.75.203.89:6443/api/v1/namespaces/default/events\": dial tcp 147.75.203.89:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.5-a-12d7dcb878.17de57b706093b49 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.5-a-12d7dcb878,UID:ci-3510.3.5-a-12d7dcb878,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-12d7dcb878,},FirstTimestamp:2024-07-02 08:22:31.294008137 +0000 UTC m=+0.281657419,LastTimestamp:2024-07-02 08:22:31.294008137 +0000 UTC m=+0.281657419,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-12d7dcb878,}" Jul 2 08:22:31.313000 audit[2238]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:31.313000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc21585550 a2=0 a3=7ffc2158553c items=0 ppid=2208 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:22:31.317000 audit[2241]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:31.317000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd9edb2270 a2=0 a3=7ffd9edb225c items=0 ppid=2208 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 08:22:31.318609 kubelet[2208]: I0702 08:22:31.318576 2208 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 08:22:31.318000 audit[2242]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:31.318000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd350c1c0 a2=0 a3=7ffcd350c1ac items=0 ppid=2208 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 08:22:31.318000 audit[2243]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:31.318000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbf5600d0 a2=0 a3=7ffdbf5600bc items=0 ppid=2208 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 08:22:31.319331 kubelet[2208]: I0702 08:22:31.319178 2208 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 08:22:31.319331 kubelet[2208]: I0702 08:22:31.319196 2208 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 08:22:31.319331 kubelet[2208]: I0702 08:22:31.319208 2208 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 08:22:31.319331 kubelet[2208]: E0702 08:22:31.319232 2208 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 08:22:31.319514 kubelet[2208]: W0702 08:22:31.319489 2208 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://147.75.203.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.319553 kubelet[2208]: E0702 08:22:31.319523 2208 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.203.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:31.319000 audit[2245]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:31.319000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5c6e6c10 a2=0 a3=7ffc5c6e6bfc items=0 ppid=2208 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 08:22:31.319000 audit[2246]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:31.319000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd91dae130 a2=0 a3=7ffd91dae11c items=0 ppid=2208 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 08:22:31.319000 audit[2247]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:31.319000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffec28b11b0 a2=0 a3=7ffec28b119c items=0 ppid=2208 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 08:22:31.319000 audit[2248]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:31.319000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd863a6a50 a2=0 a3=7ffd863a6a3c items=0 ppid=2208 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 08:22:31.320000 audit[2249]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:31.320000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc364ad1d0 a2=0 a3=7ffc364ad1bc items=0 ppid=2208 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 08:22:31.419603 kubelet[2208]: E0702 08:22:31.419485 2208 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 08:22:31.462356 kubelet[2208]: I0702 08:22:31.462293 2208 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.463133 kubelet[2208]: E0702 08:22:31.463076 2208 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.89:6443/api/v1/nodes\": dial tcp 147.75.203.89:6443: connect: connection refused" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.463729 kubelet[2208]: I0702 08:22:31.463693 2208 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 08:22:31.463729 kubelet[2208]: I0702 08:22:31.463726 2208 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 08:22:31.463960 kubelet[2208]: I0702 08:22:31.463764 2208 state_mem.go:36] "Initialized new in-memory state store" Jul 2 08:22:31.465591 kubelet[2208]: I0702 08:22:31.465541 2208 policy_none.go:49] "None policy: Start" Jul 2 08:22:31.466912 kubelet[2208]: I0702 08:22:31.466874 2208 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 08:22:31.467077 kubelet[2208]: I0702 08:22:31.466963 2208 state_mem.go:35] "Initializing new in-memory state store" Jul 2 08:22:31.479635 systemd[1]: Created slice kubepods.slice. Jul 2 08:22:31.490377 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 08:22:31.497907 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 08:22:31.510401 kubelet[2208]: E0702 08:22:31.510287 2208 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-12d7dcb878?timeout=10s\": dial tcp 147.75.203.89:6443: connect: connection refused" interval="400ms" Jul 2 08:22:31.512275 kubelet[2208]: I0702 08:22:31.512189 2208 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 08:22:31.510000 audit[2208]: AVC avc: denied { mac_admin } for pid=2208 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:31.510000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:22:31.510000 audit[2208]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0014b8450 a1=c0004a1ec0 a2=c0014b8420 a3=25 items=0 ppid=1 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:31.510000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:22:31.513286 kubelet[2208]: I0702 08:22:31.512346 2208 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 08:22:31.513286 kubelet[2208]: I0702 08:22:31.512635 2208 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 08:22:31.513286 kubelet[2208]: I0702 08:22:31.512936 2208 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 08:22:31.515009 kubelet[2208]: E0702 08:22:31.514946 2208 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:31.620962 kubelet[2208]: I0702 08:22:31.620716 2208 topology_manager.go:215] "Topology Admit Handler" podUID="0a6837eafe9458b2f49333a517057904" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.625205 kubelet[2208]: I0702 08:22:31.625151 2208 topology_manager.go:215] "Topology Admit Handler" podUID="ba0871b7de9a5f0b4d82b473c9b8503c" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.626682 kubelet[2208]: I0702 08:22:31.626672 2208 topology_manager.go:215] "Topology Admit Handler" podUID="67eb08aaebfb8c925c65e339117dfe03" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.629938 systemd[1]: Created slice kubepods-burstable-pod0a6837eafe9458b2f49333a517057904.slice. Jul 2 08:22:31.656876 systemd[1]: Created slice kubepods-burstable-podba0871b7de9a5f0b4d82b473c9b8503c.slice. Jul 2 08:22:31.666966 kubelet[2208]: I0702 08:22:31.666907 2208 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.667630 kubelet[2208]: E0702 08:22:31.667544 2208 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.89:6443/api/v1/nodes\": dial tcp 147.75.203.89:6443: connect: connection refused" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.681585 systemd[1]: Created slice kubepods-burstable-pod67eb08aaebfb8c925c65e339117dfe03.slice. Jul 2 08:22:31.698086 kubelet[2208]: I0702 08:22:31.697989 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.698264 kubelet[2208]: I0702 08:22:31.698101 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.698264 kubelet[2208]: I0702 08:22:31.698182 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.698458 kubelet[2208]: I0702 08:22:31.698252 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0a6837eafe9458b2f49333a517057904-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-12d7dcb878\" (UID: \"0a6837eafe9458b2f49333a517057904\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.698458 kubelet[2208]: I0702 08:22:31.698322 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0a6837eafe9458b2f49333a517057904-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-12d7dcb878\" (UID: \"0a6837eafe9458b2f49333a517057904\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.698458 kubelet[2208]: I0702 08:22:31.698383 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0a6837eafe9458b2f49333a517057904-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-12d7dcb878\" (UID: \"0a6837eafe9458b2f49333a517057904\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.698772 kubelet[2208]: I0702 08:22:31.698472 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.698772 kubelet[2208]: I0702 08:22:31.698572 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.698772 kubelet[2208]: I0702 08:22:31.698629 2208 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/67eb08aaebfb8c925c65e339117dfe03-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-12d7dcb878\" (UID: \"67eb08aaebfb8c925c65e339117dfe03\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:31.912193 kubelet[2208]: E0702 08:22:31.911949 2208 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-12d7dcb878?timeout=10s\": dial tcp 147.75.203.89:6443: connect: connection refused" interval="800ms" Jul 2 08:22:31.952760 env[1571]: time="2024-07-02T08:22:31.952620359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-12d7dcb878,Uid:0a6837eafe9458b2f49333a517057904,Namespace:kube-system,Attempt:0,}" Jul 2 08:22:31.976885 env[1571]: time="2024-07-02T08:22:31.976801786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-12d7dcb878,Uid:ba0871b7de9a5f0b4d82b473c9b8503c,Namespace:kube-system,Attempt:0,}" Jul 2 08:22:31.986761 env[1571]: time="2024-07-02T08:22:31.986685369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-12d7dcb878,Uid:67eb08aaebfb8c925c65e339117dfe03,Namespace:kube-system,Attempt:0,}" Jul 2 08:22:32.071796 kubelet[2208]: I0702 08:22:32.071742 2208 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:32.072515 kubelet[2208]: E0702 08:22:32.072390 2208 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.89:6443/api/v1/nodes\": dial tcp 147.75.203.89:6443: connect: connection refused" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:32.198177 kubelet[2208]: W0702 08:22:32.197946 2208 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://147.75.203.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:32.198177 kubelet[2208]: E0702 08:22:32.198105 2208 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.203.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:32.490169 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2420310489.mount: Deactivated successfully. Jul 2 08:22:32.491385 env[1571]: time="2024-07-02T08:22:32.491367795Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.492492 env[1571]: time="2024-07-02T08:22:32.492480704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.493105 env[1571]: time="2024-07-02T08:22:32.493095305Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.493764 env[1571]: time="2024-07-02T08:22:32.493753344Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.494224 env[1571]: time="2024-07-02T08:22:32.494213403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.495723 env[1571]: time="2024-07-02T08:22:32.495672495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.497471 env[1571]: time="2024-07-02T08:22:32.497459118Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.498807 env[1571]: time="2024-07-02T08:22:32.498793625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.499147 env[1571]: time="2024-07-02T08:22:32.499135623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.499931 env[1571]: time="2024-07-02T08:22:32.499921892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.500255 env[1571]: time="2024-07-02T08:22:32.500246961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.500664 env[1571]: time="2024-07-02T08:22:32.500645162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:32.504275 env[1571]: time="2024-07-02T08:22:32.504222859Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:22:32.504275 env[1571]: time="2024-07-02T08:22:32.504246526Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:22:32.504275 env[1571]: time="2024-07-02T08:22:32.504253475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:22:32.504378 env[1571]: time="2024-07-02T08:22:32.504337910Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6fc4599376a5558f59f66b04d8ee83c091fee499623d95e776e5109c9b25a3f4 pid=2258 runtime=io.containerd.runc.v2 Jul 2 08:22:32.506021 env[1571]: time="2024-07-02T08:22:32.505982307Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:22:32.506021 env[1571]: time="2024-07-02T08:22:32.506003733Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:22:32.506021 env[1571]: time="2024-07-02T08:22:32.506010810Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:22:32.506168 env[1571]: time="2024-07-02T08:22:32.506145176Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/891f94107a12591c85dfd0ba7dcfdfec53f5f494a80fef078e25158d8dd1fb1d pid=2280 runtime=io.containerd.runc.v2 Jul 2 08:22:32.506668 env[1571]: time="2024-07-02T08:22:32.506640708Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:22:32.506668 env[1571]: time="2024-07-02T08:22:32.506659300Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:22:32.506742 env[1571]: time="2024-07-02T08:22:32.506666130Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:22:32.506742 env[1571]: time="2024-07-02T08:22:32.506729554Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/124681d622cef9b24c6da456c22574cd465c3187a41fee79a21f408f13c05223 pid=2286 runtime=io.containerd.runc.v2 Jul 2 08:22:32.510516 systemd[1]: Started cri-containerd-6fc4599376a5558f59f66b04d8ee83c091fee499623d95e776e5109c9b25a3f4.scope. Jul 2 08:22:32.512492 systemd[1]: Started cri-containerd-124681d622cef9b24c6da456c22574cd465c3187a41fee79a21f408f13c05223.scope. Jul 2 08:22:32.513168 systemd[1]: Started cri-containerd-891f94107a12591c85dfd0ba7dcfdfec53f5f494a80fef078e25158d8dd1fb1d.scope. Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit: BPF prog-id=55 op=LOAD Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2258 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633435393933373661353535386635396636366230346438656538 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2258 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633435393933373661353535386635396636366230346438656538 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit: BPF prog-id=56 op=LOAD Jul 2 08:22:32.517000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000308df0 items=0 ppid=2258 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633435393933373661353535386635396636366230346438656538 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.517000 audit: BPF prog-id=57 op=LOAD Jul 2 08:22:32.517000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000308e38 items=0 ppid=2258 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633435393933373661353535386635396636366230346438656538 Jul 2 08:22:32.518000 audit: BPF prog-id=57 op=UNLOAD Jul 2 08:22:32.518000 audit: BPF prog-id=56 op=UNLOAD Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit: BPF prog-id=58 op=LOAD Jul 2 08:22:32.518000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000309248 items=0 ppid=2258 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633435393933373661353535386635396636366230346438656538 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit: BPF prog-id=59 op=LOAD Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2286 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132343638316436323263656639623234633664613435366332323537 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2286 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132343638316436323263656639623234633664613435366332323537 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit: BPF prog-id=60 op=LOAD Jul 2 08:22:32.518000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000337d10 items=0 ppid=2286 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132343638316436323263656639623234633664613435366332323537 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit: BPF prog-id=61 op=LOAD Jul 2 08:22:32.518000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000337d58 items=0 ppid=2286 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132343638316436323263656639623234633664613435366332323537 Jul 2 08:22:32.518000 audit: BPF prog-id=61 op=UNLOAD Jul 2 08:22:32.518000 audit: BPF prog-id=60 op=UNLOAD Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.518000 audit: BPF prog-id=62 op=LOAD Jul 2 08:22:32.518000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003b4168 items=0 ppid=2286 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132343638316436323263656639623234633664613435366332323537 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit: BPF prog-id=63 op=LOAD Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2280 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839316639343130376131323539316338356466643062613764636664 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2280 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839316639343130376131323539316338356466643062613764636664 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit: BPF prog-id=64 op=LOAD Jul 2 08:22:32.519000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00026dd90 items=0 ppid=2280 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839316639343130376131323539316338356466643062613764636664 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit: BPF prog-id=65 op=LOAD Jul 2 08:22:32.519000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00026ddd8 items=0 ppid=2280 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839316639343130376131323539316338356466643062613764636664 Jul 2 08:22:32.519000 audit: BPF prog-id=65 op=UNLOAD Jul 2 08:22:32.519000 audit: BPF prog-id=64 op=UNLOAD Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.519000 audit: BPF prog-id=66 op=LOAD Jul 2 08:22:32.519000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003e21e8 items=0 ppid=2280 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839316639343130376131323539316338356466643062613764636664 Jul 2 08:22:32.534824 env[1571]: time="2024-07-02T08:22:32.534798161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-12d7dcb878,Uid:0a6837eafe9458b2f49333a517057904,Namespace:kube-system,Attempt:0,} returns sandbox id \"6fc4599376a5558f59f66b04d8ee83c091fee499623d95e776e5109c9b25a3f4\"" Jul 2 08:22:32.535475 env[1571]: time="2024-07-02T08:22:32.535454962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-12d7dcb878,Uid:ba0871b7de9a5f0b4d82b473c9b8503c,Namespace:kube-system,Attempt:0,} returns sandbox id \"124681d622cef9b24c6da456c22574cd465c3187a41fee79a21f408f13c05223\"" Jul 2 08:22:32.535901 env[1571]: time="2024-07-02T08:22:32.535888623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-12d7dcb878,Uid:67eb08aaebfb8c925c65e339117dfe03,Namespace:kube-system,Attempt:0,} returns sandbox id \"891f94107a12591c85dfd0ba7dcfdfec53f5f494a80fef078e25158d8dd1fb1d\"" Jul 2 08:22:32.536881 env[1571]: time="2024-07-02T08:22:32.536867398Z" level=info msg="CreateContainer within sandbox \"124681d622cef9b24c6da456c22574cd465c3187a41fee79a21f408f13c05223\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 08:22:32.536930 env[1571]: time="2024-07-02T08:22:32.536886051Z" level=info msg="CreateContainer within sandbox \"891f94107a12591c85dfd0ba7dcfdfec53f5f494a80fef078e25158d8dd1fb1d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 08:22:32.536930 env[1571]: time="2024-07-02T08:22:32.536889972Z" level=info msg="CreateContainer within sandbox \"6fc4599376a5558f59f66b04d8ee83c091fee499623d95e776e5109c9b25a3f4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 08:22:32.543745 env[1571]: time="2024-07-02T08:22:32.543726658Z" level=info msg="CreateContainer within sandbox \"6fc4599376a5558f59f66b04d8ee83c091fee499623d95e776e5109c9b25a3f4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"fdce8f54f7cd10c8c5aefad33d7b810b245da89ab353a6b81d43f713d6bcb689\"" Jul 2 08:22:32.543995 env[1571]: time="2024-07-02T08:22:32.543980774Z" level=info msg="StartContainer for \"fdce8f54f7cd10c8c5aefad33d7b810b245da89ab353a6b81d43f713d6bcb689\"" Jul 2 08:22:32.546041 env[1571]: time="2024-07-02T08:22:32.546027136Z" level=info msg="CreateContainer within sandbox \"124681d622cef9b24c6da456c22574cd465c3187a41fee79a21f408f13c05223\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"88eaef1f8aeeb60532c452121e0585e134485dbdb2e3a0fa37355f453097ece3\"" Jul 2 08:22:32.546344 env[1571]: time="2024-07-02T08:22:32.546320726Z" level=info msg="StartContainer for \"88eaef1f8aeeb60532c452121e0585e134485dbdb2e3a0fa37355f453097ece3\"" Jul 2 08:22:32.546411 env[1571]: time="2024-07-02T08:22:32.546385803Z" level=info msg="CreateContainer within sandbox \"891f94107a12591c85dfd0ba7dcfdfec53f5f494a80fef078e25158d8dd1fb1d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"8875454481661a9e3e60ea42580dc7c546f3e7702f4053244afd0f9ee6a33e14\"" Jul 2 08:22:32.546779 env[1571]: time="2024-07-02T08:22:32.546750785Z" level=info msg="StartContainer for \"8875454481661a9e3e60ea42580dc7c546f3e7702f4053244afd0f9ee6a33e14\"" Jul 2 08:22:32.552732 systemd[1]: Started cri-containerd-fdce8f54f7cd10c8c5aefad33d7b810b245da89ab353a6b81d43f713d6bcb689.scope. Jul 2 08:22:32.555371 systemd[1]: Started cri-containerd-8875454481661a9e3e60ea42580dc7c546f3e7702f4053244afd0f9ee6a33e14.scope. Jul 2 08:22:32.555953 systemd[1]: Started cri-containerd-88eaef1f8aeeb60532c452121e0585e134485dbdb2e3a0fa37355f453097ece3.scope. Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit: BPF prog-id=67 op=LOAD Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2258 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664636538663534663763643130633863356165666164333364376238 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2258 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664636538663534663763643130633863356165666164333364376238 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.558000 audit: BPF prog-id=68 op=LOAD Jul 2 08:22:32.558000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000223a90 items=0 ppid=2258 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664636538663534663763643130633863356165666164333364376238 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit: BPF prog-id=69 op=LOAD Jul 2 08:22:32.559000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000223ad8 items=0 ppid=2258 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664636538663534663763643130633863356165666164333364376238 Jul 2 08:22:32.559000 audit: BPF prog-id=69 op=UNLOAD Jul 2 08:22:32.559000 audit: BPF prog-id=68 op=UNLOAD Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.559000 audit: BPF prog-id=70 op=LOAD Jul 2 08:22:32.559000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000223ee8 items=0 ppid=2258 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664636538663534663763643130633863356165666164333364376238 Jul 2 08:22:32.560709 kubelet[2208]: W0702 08:22:32.560675 2208 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://147.75.203.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-12d7dcb878&limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:32.560756 kubelet[2208]: E0702 08:22:32.560717 2208 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.203.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-12d7dcb878&limit=500&resourceVersion=0": dial tcp 147.75.203.89:6443: connect: connection refused Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit: BPF prog-id=71 op=LOAD Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2280 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373534353434383136363161396533653630656134323538306463 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2280 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373534353434383136363161396533653630656134323538306463 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit: BPF prog-id=72 op=LOAD Jul 2 08:22:32.560000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d9b50 items=0 ppid=2280 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373534353434383136363161396533653630656134323538306463 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.560000 audit: BPF prog-id=73 op=LOAD Jul 2 08:22:32.560000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d9b98 items=0 ppid=2280 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373534353434383136363161396533653630656134323538306463 Jul 2 08:22:32.561000 audit: BPF prog-id=73 op=UNLOAD Jul 2 08:22:32.561000 audit: BPF prog-id=72 op=UNLOAD Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit: BPF prog-id=74 op=LOAD Jul 2 08:22:32.561000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d9fa8 items=0 ppid=2280 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373534353434383136363161396533653630656134323538306463 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit: BPF prog-id=75 op=LOAD Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2286 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656165663166386165656236303533326334353231323165303538 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2286 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656165663166386165656236303533326334353231323165303538 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit: BPF prog-id=76 op=LOAD Jul 2 08:22:32.561000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025a00 items=0 ppid=2286 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656165663166386165656236303533326334353231323165303538 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit: BPF prog-id=77 op=LOAD Jul 2 08:22:32.561000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025a48 items=0 ppid=2286 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656165663166386165656236303533326334353231323165303538 Jul 2 08:22:32.561000 audit: BPF prog-id=77 op=UNLOAD Jul 2 08:22:32.561000 audit: BPF prog-id=76 op=UNLOAD Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:32.561000 audit: BPF prog-id=78 op=LOAD Jul 2 08:22:32.561000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025e58 items=0 ppid=2286 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:32.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656165663166386165656236303533326334353231323165303538 Jul 2 08:22:32.576809 env[1571]: time="2024-07-02T08:22:32.576783034Z" level=info msg="StartContainer for \"fdce8f54f7cd10c8c5aefad33d7b810b245da89ab353a6b81d43f713d6bcb689\" returns successfully" Jul 2 08:22:32.577998 env[1571]: time="2024-07-02T08:22:32.577958021Z" level=info msg="StartContainer for \"8875454481661a9e3e60ea42580dc7c546f3e7702f4053244afd0f9ee6a33e14\" returns successfully" Jul 2 08:22:32.579328 env[1571]: time="2024-07-02T08:22:32.579307615Z" level=info msg="StartContainer for \"88eaef1f8aeeb60532c452121e0585e134485dbdb2e3a0fa37355f453097ece3\" returns successfully" Jul 2 08:22:32.874488 kubelet[2208]: I0702 08:22:32.874313 2208 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:33.137000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:33.137000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c0a000 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:22:33.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:22:33.137000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:33.137000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00008e280 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:22:33.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:22:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004bce060 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:22:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c003fe8000 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:22:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:22:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:22:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005a800c0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:22:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:22:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0049e2210 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:22:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:22:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c004a2e040 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:22:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:22:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0048cc1b0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:22:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:22:33.171827 kubelet[2208]: E0702 08:22:33.171790 2208 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.5-a-12d7dcb878\" not found" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:33.285886 kubelet[2208]: I0702 08:22:33.285794 2208 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:33.307262 kubelet[2208]: E0702 08:22:33.307172 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:33.408315 kubelet[2208]: E0702 08:22:33.408087 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:33.509316 kubelet[2208]: E0702 08:22:33.509253 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:33.609713 kubelet[2208]: E0702 08:22:33.609646 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:33.710978 kubelet[2208]: E0702 08:22:33.710729 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:33.811780 kubelet[2208]: E0702 08:22:33.811652 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:33.912786 kubelet[2208]: E0702 08:22:33.912681 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:34.013800 kubelet[2208]: E0702 08:22:34.013703 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:34.114989 kubelet[2208]: E0702 08:22:34.114877 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:34.215744 kubelet[2208]: E0702 08:22:34.215646 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:34.316816 kubelet[2208]: E0702 08:22:34.316607 2208 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:35.285618 kubelet[2208]: I0702 08:22:35.285525 2208 apiserver.go:52] "Watching apiserver" Jul 2 08:22:35.295803 kubelet[2208]: I0702 08:22:35.295734 2208 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 08:22:35.552457 kubelet[2208]: W0702 08:22:35.552403 2208 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 08:22:35.972866 systemd[1]: Reloading. Jul 2 08:22:36.003273 /usr/lib/systemd/system-generators/torcx-generator[2542]: time="2024-07-02T08:22:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:22:36.003291 /usr/lib/systemd/system-generators/torcx-generator[2542]: time="2024-07-02T08:22:36Z" level=info msg="torcx already run" Jul 2 08:22:36.066765 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:22:36.066775 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:22:36.080648 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.161612 kernel: kauditd_printk_skb: 581 callbacks suppressed Jul 2 08:22:36.161651 kernel: audit: type=1400 audit(1719908556.134:538): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.287071 kernel: audit: type=1400 audit(1719908556.134:539): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.287150 kernel: audit: type=1400 audit(1719908556.134:540): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.350275 kernel: audit: type=1400 audit(1719908556.134:541): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.414414 kernel: audit: type=1400 audit(1719908556.134:542): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.478134 kernel: audit: type=1400 audit(1719908556.134:543): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.541772 kernel: audit: type=1400 audit(1719908556.134:544): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.606066 kernel: audit: type=1400 audit(1719908556.134:545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.669476 kernel: audit: type=1400 audit(1719908556.134:546): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.732460 kernel: audit: type=1400 audit(1719908556.223:547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.223000 audit: BPF prog-id=79 op=LOAD Jul 2 08:22:36.223000 audit: BPF prog-id=40 op=UNLOAD Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit: BPF prog-id=80 op=LOAD Jul 2 08:22:36.348000 audit: BPF prog-id=41 op=UNLOAD Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit: BPF prog-id=81 op=LOAD Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit: BPF prog-id=82 op=LOAD Jul 2 08:22:36.604000 audit: BPF prog-id=42 op=UNLOAD Jul 2 08:22:36.604000 audit: BPF prog-id=43 op=UNLOAD Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.731000 audit: BPF prog-id=83 op=LOAD Jul 2 08:22:36.731000 audit: BPF prog-id=55 op=UNLOAD Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.794000 audit: BPF prog-id=84 op=LOAD Jul 2 08:22:36.794000 audit: BPF prog-id=44 op=UNLOAD Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit: BPF prog-id=85 op=LOAD Jul 2 08:22:36.795000 audit: BPF prog-id=45 op=UNLOAD Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit: BPF prog-id=86 op=LOAD Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.795000 audit: BPF prog-id=87 op=LOAD Jul 2 08:22:36.795000 audit: BPF prog-id=46 op=UNLOAD Jul 2 08:22:36.795000 audit: BPF prog-id=47 op=UNLOAD Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.796000 audit: BPF prog-id=88 op=LOAD Jul 2 08:22:36.796000 audit: BPF prog-id=71 op=UNLOAD Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit: BPF prog-id=89 op=LOAD Jul 2 08:22:36.797000 audit: BPF prog-id=63 op=UNLOAD Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit: BPF prog-id=90 op=LOAD Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.797000 audit: BPF prog-id=91 op=LOAD Jul 2 08:22:36.797000 audit: BPF prog-id=48 op=UNLOAD Jul 2 08:22:36.797000 audit: BPF prog-id=49 op=UNLOAD Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit: BPF prog-id=92 op=LOAD Jul 2 08:22:36.798000 audit: BPF prog-id=50 op=UNLOAD Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.798000 audit: BPF prog-id=93 op=LOAD Jul 2 08:22:36.798000 audit: BPF prog-id=67 op=UNLOAD Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit: BPF prog-id=94 op=LOAD Jul 2 08:22:36.799000 audit: BPF prog-id=75 op=UNLOAD Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.799000 audit: BPF prog-id=95 op=LOAD Jul 2 08:22:36.799000 audit: BPF prog-id=59 op=UNLOAD Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit: BPF prog-id=96 op=LOAD Jul 2 08:22:36.800000 audit: BPF prog-id=51 op=UNLOAD Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit: BPF prog-id=97 op=LOAD Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit: BPF prog-id=98 op=LOAD Jul 2 08:22:36.801000 audit: BPF prog-id=52 op=UNLOAD Jul 2 08:22:36.801000 audit: BPF prog-id=53 op=UNLOAD Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:36.801000 audit: BPF prog-id=99 op=LOAD Jul 2 08:22:36.801000 audit: BPF prog-id=54 op=UNLOAD Jul 2 08:22:36.807875 systemd[1]: Stopping kubelet.service... Jul 2 08:22:36.807976 kubelet[2208]: I0702 08:22:36.807916 2208 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 08:22:36.836932 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 08:22:36.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:36.837032 systemd[1]: Stopped kubelet.service. Jul 2 08:22:36.837913 systemd[1]: Starting kubelet.service... Jul 2 08:22:37.036551 systemd[1]: Started kubelet.service. Jul 2 08:22:37.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:37.064871 kubelet[2607]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 08:22:37.064871 kubelet[2607]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 08:22:37.064871 kubelet[2607]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 08:22:37.064871 kubelet[2607]: I0702 08:22:37.064844 2607 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 08:22:37.068024 kubelet[2607]: I0702 08:22:37.068008 2607 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 08:22:37.068024 kubelet[2607]: I0702 08:22:37.068023 2607 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 08:22:37.068140 kubelet[2607]: I0702 08:22:37.068133 2607 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 08:22:37.068928 kubelet[2607]: I0702 08:22:37.068887 2607 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 08:22:37.069520 kubelet[2607]: I0702 08:22:37.069508 2607 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 08:22:37.089610 kubelet[2607]: I0702 08:22:37.089590 2607 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 08:22:37.089745 kubelet[2607]: I0702 08:22:37.089725 2607 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 08:22:37.089848 kubelet[2607]: I0702 08:22:37.089745 2607 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.5-a-12d7dcb878","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 08:22:37.089935 kubelet[2607]: I0702 08:22:37.089854 2607 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 08:22:37.089935 kubelet[2607]: I0702 08:22:37.089861 2607 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 08:22:37.089935 kubelet[2607]: I0702 08:22:37.089882 2607 state_mem.go:36] "Initialized new in-memory state store" Jul 2 08:22:37.089935 kubelet[2607]: I0702 08:22:37.089931 2607 kubelet.go:400] "Attempting to sync node with API server" Jul 2 08:22:37.090057 kubelet[2607]: I0702 08:22:37.089938 2607 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 08:22:37.090057 kubelet[2607]: I0702 08:22:37.089951 2607 kubelet.go:312] "Adding apiserver pod source" Jul 2 08:22:37.090057 kubelet[2607]: I0702 08:22:37.089960 2607 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 08:22:37.090372 kubelet[2607]: I0702 08:22:37.090361 2607 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 08:22:37.090478 kubelet[2607]: I0702 08:22:37.090471 2607 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 08:22:37.090713 kubelet[2607]: I0702 08:22:37.090705 2607 server.go:1264] "Started kubelet" Jul 2 08:22:37.090750 kubelet[2607]: I0702 08:22:37.090722 2607 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 08:22:37.090790 kubelet[2607]: I0702 08:22:37.090751 2607 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 08:22:37.090920 kubelet[2607]: I0702 08:22:37.090908 2607 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 08:22:37.089000 audit[2607]: AVC avc: denied { mac_admin } for pid=2607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:37.089000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:22:37.089000 audit[2607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004c36e0 a1=c00087e618 a2=c0004c3650 a3=25 items=0 ppid=1 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:37.089000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:22:37.089000 audit[2607]: AVC avc: denied { mac_admin } for pid=2607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:37.089000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:22:37.089000 audit[2607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004058e0 a1=c00087e630 a2=c0004c3800 a3=25 items=0 ppid=1 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:37.089000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:22:37.091909 kubelet[2607]: I0702 08:22:37.091325 2607 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 08:22:37.091909 kubelet[2607]: I0702 08:22:37.091347 2607 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 08:22:37.091909 kubelet[2607]: I0702 08:22:37.091361 2607 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 08:22:37.091909 kubelet[2607]: I0702 08:22:37.091398 2607 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 08:22:37.091909 kubelet[2607]: E0702 08:22:37.091408 2607 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-12d7dcb878\" not found" Jul 2 08:22:37.091909 kubelet[2607]: I0702 08:22:37.091424 2607 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 08:22:37.091909 kubelet[2607]: I0702 08:22:37.091437 2607 server.go:455] "Adding debug handlers to kubelet server" Jul 2 08:22:37.091909 kubelet[2607]: I0702 08:22:37.091526 2607 reconciler.go:26] "Reconciler: start to sync state" Jul 2 08:22:37.092104 kubelet[2607]: I0702 08:22:37.091983 2607 factory.go:221] Registration of the systemd container factory successfully Jul 2 08:22:37.092104 kubelet[2607]: I0702 08:22:37.092042 2607 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 08:22:37.092408 kubelet[2607]: E0702 08:22:37.092392 2607 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 08:22:37.092990 kubelet[2607]: I0702 08:22:37.092978 2607 factory.go:221] Registration of the containerd container factory successfully Jul 2 08:22:37.096872 kubelet[2607]: I0702 08:22:37.096849 2607 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 08:22:37.097409 kubelet[2607]: I0702 08:22:37.097398 2607 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 08:22:37.097470 kubelet[2607]: I0702 08:22:37.097418 2607 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 08:22:37.097470 kubelet[2607]: I0702 08:22:37.097433 2607 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 08:22:37.097566 kubelet[2607]: E0702 08:22:37.097463 2607 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 08:22:37.108536 kubelet[2607]: I0702 08:22:37.108520 2607 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 08:22:37.108536 kubelet[2607]: I0702 08:22:37.108530 2607 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 08:22:37.108536 kubelet[2607]: I0702 08:22:37.108541 2607 state_mem.go:36] "Initialized new in-memory state store" Jul 2 08:22:37.108663 kubelet[2607]: I0702 08:22:37.108636 2607 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 08:22:37.108663 kubelet[2607]: I0702 08:22:37.108642 2607 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 08:22:37.108663 kubelet[2607]: I0702 08:22:37.108654 2607 policy_none.go:49] "None policy: Start" Jul 2 08:22:37.108889 kubelet[2607]: I0702 08:22:37.108881 2607 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 08:22:37.108917 kubelet[2607]: I0702 08:22:37.108893 2607 state_mem.go:35] "Initializing new in-memory state store" Jul 2 08:22:37.109003 kubelet[2607]: I0702 08:22:37.108997 2607 state_mem.go:75] "Updated machine memory state" Jul 2 08:22:37.111054 kubelet[2607]: I0702 08:22:37.111017 2607 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 08:22:37.111054 kubelet[2607]: I0702 08:22:37.111045 2607 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 08:22:37.109000 audit[2607]: AVC avc: denied { mac_admin } for pid=2607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:37.109000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:22:37.109000 audit[2607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d50360 a1=c0016543f0 a2=c000d50330 a3=25 items=0 ppid=1 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:37.109000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:22:37.111244 kubelet[2607]: I0702 08:22:37.111119 2607 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 08:22:37.111244 kubelet[2607]: I0702 08:22:37.111168 2607 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 08:22:37.193813 kubelet[2607]: I0702 08:22:37.193798 2607 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.198004 kubelet[2607]: I0702 08:22:37.197956 2607 topology_manager.go:215] "Topology Admit Handler" podUID="ba0871b7de9a5f0b4d82b473c9b8503c" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.198052 kubelet[2607]: I0702 08:22:37.198010 2607 topology_manager.go:215] "Topology Admit Handler" podUID="67eb08aaebfb8c925c65e339117dfe03" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.198052 kubelet[2607]: I0702 08:22:37.198045 2607 topology_manager.go:215] "Topology Admit Handler" podUID="0a6837eafe9458b2f49333a517057904" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.209332 kubelet[2607]: W0702 08:22:37.209280 2607 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 08:22:37.209407 kubelet[2607]: W0702 08:22:37.209280 2607 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 08:22:37.209840 kubelet[2607]: W0702 08:22:37.209830 2607 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 08:22:37.209881 kubelet[2607]: E0702 08:22:37.209862 2607 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-12d7dcb878\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.211156 kubelet[2607]: I0702 08:22:37.211112 2607 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.211156 kubelet[2607]: I0702 08:22:37.211152 2607 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292459 kubelet[2607]: I0702 08:22:37.292441 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0a6837eafe9458b2f49333a517057904-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-12d7dcb878\" (UID: \"0a6837eafe9458b2f49333a517057904\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292459 kubelet[2607]: I0702 08:22:37.292460 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292577 kubelet[2607]: I0702 08:22:37.292473 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/67eb08aaebfb8c925c65e339117dfe03-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-12d7dcb878\" (UID: \"67eb08aaebfb8c925c65e339117dfe03\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292577 kubelet[2607]: I0702 08:22:37.292483 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0a6837eafe9458b2f49333a517057904-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-12d7dcb878\" (UID: \"0a6837eafe9458b2f49333a517057904\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292577 kubelet[2607]: I0702 08:22:37.292493 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292577 kubelet[2607]: I0702 08:22:37.292506 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0a6837eafe9458b2f49333a517057904-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-12d7dcb878\" (UID: \"0a6837eafe9458b2f49333a517057904\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292577 kubelet[2607]: I0702 08:22:37.292516 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292685 kubelet[2607]: I0702 08:22:37.292526 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:37.292685 kubelet[2607]: I0702 08:22:37.292538 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ba0871b7de9a5f0b4d82b473c9b8503c-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" (UID: \"ba0871b7de9a5f0b4d82b473c9b8503c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:38.090312 kubelet[2607]: I0702 08:22:38.090233 2607 apiserver.go:52] "Watching apiserver" Jul 2 08:22:38.112133 kubelet[2607]: W0702 08:22:38.112058 2607 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 08:22:38.112133 kubelet[2607]: W0702 08:22:38.112074 2607 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 08:22:38.112450 kubelet[2607]: W0702 08:22:38.112145 2607 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 08:22:38.112450 kubelet[2607]: E0702 08:22:38.112189 2607 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.5-a-12d7dcb878\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:38.112450 kubelet[2607]: E0702 08:22:38.112212 2607 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-12d7dcb878\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:38.112450 kubelet[2607]: E0702 08:22:38.112264 2607 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.5-a-12d7dcb878\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.5-a-12d7dcb878" Jul 2 08:22:38.145012 kubelet[2607]: I0702 08:22:38.144949 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.5-a-12d7dcb878" podStartSLOduration=3.144911047 podStartE2EDuration="3.144911047s" podCreationTimestamp="2024-07-02 08:22:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 08:22:38.144798427 +0000 UTC m=+1.103638361" watchObservedRunningTime="2024-07-02 08:22:38.144911047 +0000 UTC m=+1.103750979" Jul 2 08:22:38.164777 kubelet[2607]: I0702 08:22:38.164697 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.5-a-12d7dcb878" podStartSLOduration=1.164677986 podStartE2EDuration="1.164677986s" podCreationTimestamp="2024-07-02 08:22:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 08:22:38.15336075 +0000 UTC m=+1.112200689" watchObservedRunningTime="2024-07-02 08:22:38.164677986 +0000 UTC m=+1.123517910" Jul 2 08:22:38.185711 kubelet[2607]: I0702 08:22:38.185390 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-12d7dcb878" podStartSLOduration=1.185353711 podStartE2EDuration="1.185353711s" podCreationTimestamp="2024-07-02 08:22:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 08:22:38.16479783 +0000 UTC m=+1.123637766" watchObservedRunningTime="2024-07-02 08:22:38.185353711 +0000 UTC m=+1.144193638" Jul 2 08:22:38.192299 kubelet[2607]: I0702 08:22:38.192242 2607 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 08:22:38.703000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:38.703000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000de5c80 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:22:38.703000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:22:38.703000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:38.703000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001206720 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:22:38.703000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:22:38.704000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:38.704000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000de5e40 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:22:38.704000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:22:38.705000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:22:38.705000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012068e0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:22:38.705000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:22:40.350650 sudo[1745]: pam_unix(sudo:session): session closed for user root Jul 2 08:22:40.349000 audit[1745]: USER_END pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:40.349000 audit[1745]: CRED_DISP pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:22:40.351497 sshd[1741]: pam_unix(sshd:session): session closed for user core Jul 2 08:22:40.350000 audit[1741]: USER_END pid=1741 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:40.350000 audit[1741]: CRED_DISP pid=1741 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:22:40.353052 systemd[1]: sshd@6-147.75.203.89:22-139.178.68.195:51650.service: Deactivated successfully. Jul 2 08:22:40.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.203.89:22-139.178.68.195:51650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:22:40.353598 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 08:22:40.353708 systemd[1]: session-9.scope: Consumed 3.096s CPU time. Jul 2 08:22:40.354099 systemd-logind[1554]: Session 9 logged out. Waiting for processes to exit. Jul 2 08:22:40.354726 systemd-logind[1554]: Removed session 9. Jul 2 08:22:48.799000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 08:22:48.826605 kernel: kauditd_printk_skb: 265 callbacks suppressed Jul 2 08:22:48.826687 kernel: audit: type=1400 audit(1719908568.799:796): avc: denied { watch } for pid=2433 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 08:22:48.799000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ce42c0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:22:49.039935 kernel: audit: type=1300 audit(1719908568.799:796): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ce42c0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:22:49.039973 kernel: audit: type=1327 audit(1719908568.799:796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:22:48.799000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:22:49.811175 kubelet[2607]: I0702 08:22:49.811142 2607 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 08:22:49.811535 env[1571]: time="2024-07-02T08:22:49.811507684Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 08:22:49.811762 kubelet[2607]: I0702 08:22:49.811656 2607 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 08:22:50.734482 kubelet[2607]: I0702 08:22:50.734395 2607 topology_manager.go:215] "Topology Admit Handler" podUID="21d44b19-81f3-496b-8740-040b2f6ca867" podNamespace="kube-system" podName="kube-proxy-nx64z" Jul 2 08:22:50.738233 systemd[1]: Created slice kubepods-besteffort-pod21d44b19_81f3_496b_8740_040b2f6ca867.slice. Jul 2 08:22:50.783602 kubelet[2607]: I0702 08:22:50.783570 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/21d44b19-81f3-496b-8740-040b2f6ca867-kube-proxy\") pod \"kube-proxy-nx64z\" (UID: \"21d44b19-81f3-496b-8740-040b2f6ca867\") " pod="kube-system/kube-proxy-nx64z" Jul 2 08:22:50.783741 kubelet[2607]: I0702 08:22:50.783608 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/21d44b19-81f3-496b-8740-040b2f6ca867-xtables-lock\") pod \"kube-proxy-nx64z\" (UID: \"21d44b19-81f3-496b-8740-040b2f6ca867\") " pod="kube-system/kube-proxy-nx64z" Jul 2 08:22:50.783741 kubelet[2607]: I0702 08:22:50.783633 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/21d44b19-81f3-496b-8740-040b2f6ca867-lib-modules\") pod \"kube-proxy-nx64z\" (UID: \"21d44b19-81f3-496b-8740-040b2f6ca867\") " pod="kube-system/kube-proxy-nx64z" Jul 2 08:22:50.783741 kubelet[2607]: I0702 08:22:50.783660 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qhd7f\" (UniqueName: \"kubernetes.io/projected/21d44b19-81f3-496b-8740-040b2f6ca867-kube-api-access-qhd7f\") pod \"kube-proxy-nx64z\" (UID: \"21d44b19-81f3-496b-8740-040b2f6ca867\") " pod="kube-system/kube-proxy-nx64z" Jul 2 08:22:51.023781 kubelet[2607]: I0702 08:22:51.023703 2607 topology_manager.go:215] "Topology Admit Handler" podUID="9c2f1e0c-afe4-4d73-9b5d-259691acd1ff" podNamespace="tigera-operator" podName="tigera-operator-76ff79f7fd-phfss" Jul 2 08:22:51.037898 systemd[1]: Created slice kubepods-besteffort-pod9c2f1e0c_afe4_4d73_9b5d_259691acd1ff.slice. Jul 2 08:22:51.058807 env[1571]: time="2024-07-02T08:22:51.058688545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nx64z,Uid:21d44b19-81f3-496b-8740-040b2f6ca867,Namespace:kube-system,Attempt:0,}" Jul 2 08:22:51.083868 env[1571]: time="2024-07-02T08:22:51.083651370Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:22:51.083868 env[1571]: time="2024-07-02T08:22:51.083762566Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:22:51.083868 env[1571]: time="2024-07-02T08:22:51.083801448Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:22:51.084528 env[1571]: time="2024-07-02T08:22:51.084348780Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b5e692626d6767563e0fed11e9b78f16f2eb0f0fcf98bc097dd082ee4d5f526 pid=2775 runtime=io.containerd.runc.v2 Jul 2 08:22:51.086265 kubelet[2607]: I0702 08:22:51.086195 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9c2f1e0c-afe4-4d73-9b5d-259691acd1ff-var-lib-calico\") pod \"tigera-operator-76ff79f7fd-phfss\" (UID: \"9c2f1e0c-afe4-4d73-9b5d-259691acd1ff\") " pod="tigera-operator/tigera-operator-76ff79f7fd-phfss" Jul 2 08:22:51.086584 kubelet[2607]: I0702 08:22:51.086296 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qcgjg\" (UniqueName: \"kubernetes.io/projected/9c2f1e0c-afe4-4d73-9b5d-259691acd1ff-kube-api-access-qcgjg\") pod \"tigera-operator-76ff79f7fd-phfss\" (UID: \"9c2f1e0c-afe4-4d73-9b5d-259691acd1ff\") " pod="tigera-operator/tigera-operator-76ff79f7fd-phfss" Jul 2 08:22:51.118028 systemd[1]: Started cri-containerd-2b5e692626d6767563e0fed11e9b78f16f2eb0f0fcf98bc097dd082ee4d5f526.scope. Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.259291 kernel: audit: type=1400 audit(1719908571.131:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.259330 kernel: audit: type=1400 audit(1719908571.131:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.259346 kernel: audit: type=1400 audit(1719908571.131:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322866 kernel: audit: type=1400 audit(1719908571.131:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.343338 env[1571]: time="2024-07-02T08:22:51.343294371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-phfss,Uid:9c2f1e0c-afe4-4d73-9b5d-259691acd1ff,Namespace:tigera-operator,Attempt:0,}" Jul 2 08:22:51.386865 kernel: audit: type=1400 audit(1719908571.131:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.391111 env[1571]: time="2024-07-02T08:22:51.391078466Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:22:51.391111 env[1571]: time="2024-07-02T08:22:51.391102319Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:22:51.391198 env[1571]: time="2024-07-02T08:22:51.391111418Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:22:51.391198 env[1571]: time="2024-07-02T08:22:51.391179113Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a12b86e26c06466f7cadbfee5588f489032bf826fb260ee6d0e11f8e3cd0508f pid=2809 runtime=io.containerd.runc.v2 Jul 2 08:22:51.396477 systemd[1]: Started cri-containerd-a12b86e26c06466f7cadbfee5588f489032bf826fb260ee6d0e11f8e3cd0508f.scope. Jul 2 08:22:51.450845 kernel: audit: type=1400 audit(1719908571.131:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514801 kernel: audit: type=1400 audit(1719908571.131:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit: BPF prog-id=100 op=LOAD Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2775 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356536393236323664363736373536336530666564313165396237 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2775 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356536393236323664363736373536336530666564313165396237 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.322000 audit: BPF prog-id=101 op=LOAD Jul 2 08:22:51.322000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c2b00 items=0 ppid=2775 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356536393236323664363736373536336530666564313165396237 Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit: BPF prog-id=102 op=LOAD Jul 2 08:22:51.514000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.514000 audit: BPF prog-id=103 op=LOAD Jul 2 08:22:51.514000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020a338 items=0 ppid=2775 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356536393236323664363736373536336530666564313165396237 Jul 2 08:22:51.578000 audit: BPF prog-id=103 op=UNLOAD Jul 2 08:22:51.578000 audit: BPF prog-id=101 op=UNLOAD Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2809 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326238366532366330363436366637636164626665653535383866 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2809 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326238366532366330363436366637636164626665653535383866 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit: BPF prog-id=104 op=LOAD Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020a748 items=0 ppid=2775 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356536393236323664363736373536336530666564313165396237 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit: BPF prog-id=105 op=LOAD Jul 2 08:22:51.578000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000218f10 items=0 ppid=2809 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326238366532366330363436366637636164626665653535383866 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit: BPF prog-id=106 op=LOAD Jul 2 08:22:51.578000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000218f58 items=0 ppid=2809 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326238366532366330363436366637636164626665653535383866 Jul 2 08:22:51.578000 audit: BPF prog-id=106 op=UNLOAD Jul 2 08:22:51.578000 audit: BPF prog-id=105 op=UNLOAD Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.578000 audit: BPF prog-id=107 op=LOAD Jul 2 08:22:51.578000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000219368 items=0 ppid=2809 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326238366532366330363436366637636164626665653535383866 Jul 2 08:22:51.583841 env[1571]: time="2024-07-02T08:22:51.583791401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nx64z,Uid:21d44b19-81f3-496b-8740-040b2f6ca867,Namespace:kube-system,Attempt:0,} returns sandbox id \"2b5e692626d6767563e0fed11e9b78f16f2eb0f0fcf98bc097dd082ee4d5f526\"" Jul 2 08:22:51.585003 env[1571]: time="2024-07-02T08:22:51.584987760Z" level=info msg="CreateContainer within sandbox \"2b5e692626d6767563e0fed11e9b78f16f2eb0f0fcf98bc097dd082ee4d5f526\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 08:22:51.590379 env[1571]: time="2024-07-02T08:22:51.590337345Z" level=info msg="CreateContainer within sandbox \"2b5e692626d6767563e0fed11e9b78f16f2eb0f0fcf98bc097dd082ee4d5f526\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f01424de2e3649fbc239d597675c4b0bb3066562863380c2caa2fe39b3abdd97\"" Jul 2 08:22:51.590540 env[1571]: time="2024-07-02T08:22:51.590527505Z" level=info msg="StartContainer for \"f01424de2e3649fbc239d597675c4b0bb3066562863380c2caa2fe39b3abdd97\"" Jul 2 08:22:51.595524 env[1571]: time="2024-07-02T08:22:51.595492549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-phfss,Uid:9c2f1e0c-afe4-4d73-9b5d-259691acd1ff,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a12b86e26c06466f7cadbfee5588f489032bf826fb260ee6d0e11f8e3cd0508f\"" Jul 2 08:22:51.596383 env[1571]: time="2024-07-02T08:22:51.596370472Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 08:22:51.598482 systemd[1]: Started cri-containerd-f01424de2e3649fbc239d597675c4b0bb3066562863380c2caa2fe39b3abdd97.scope. Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f525be5da18 items=0 ppid=2775 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313432346465326533363439666263323339643539373637356334 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit: BPF prog-id=108 op=LOAD Jul 2 08:22:51.605000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000dfba8 items=0 ppid=2775 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313432346465326533363439666263323339643539373637356334 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit: BPF prog-id=109 op=LOAD Jul 2 08:22:51.605000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000dfbf8 items=0 ppid=2775 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313432346465326533363439666263323339643539373637356334 Jul 2 08:22:51.605000 audit: BPF prog-id=109 op=UNLOAD Jul 2 08:22:51.605000 audit: BPF prog-id=108 op=UNLOAD Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:51.605000 audit: BPF prog-id=110 op=LOAD Jul 2 08:22:51.605000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000dfc88 items=0 ppid=2775 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313432346465326533363439666263323339643539373637356334 Jul 2 08:22:51.611884 env[1571]: time="2024-07-02T08:22:51.611860322Z" level=info msg="StartContainer for \"f01424de2e3649fbc239d597675c4b0bb3066562863380c2caa2fe39b3abdd97\" returns successfully" Jul 2 08:22:51.642000 audit[2916]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.642000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc5dde900 a2=0 a3=7ffdc5dde8ec items=0 ppid=2865 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 08:22:51.642000 audit[2917]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.642000 audit[2917]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1face500 a2=0 a3=4da41f011fc5705d items=0 ppid=2865 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 08:22:51.643000 audit[2918]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.643000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceaa91540 a2=0 a3=7ffceaa9152c items=0 ppid=2865 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 08:22:51.643000 audit[2919]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.643000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbf3c5dc0 a2=0 a3=7ffdbf3c5dac items=0 ppid=2865 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 08:22:51.643000 audit[2921]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.643000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfdbd2990 a2=0 a3=7ffdfdbd297c items=0 ppid=2865 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 08:22:51.644000 audit[2922]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.644000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5c9e8c40 a2=0 a3=7ffe5c9e8c2c items=0 ppid=2865 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 08:22:51.746000 audit[2923]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.746000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff933aeaa0 a2=0 a3=7fff933aea8c items=0 ppid=2865 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 08:22:51.753000 audit[2925]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.753000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe0deb8ee0 a2=0 a3=7ffe0deb8ecc items=0 ppid=2865 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 08:22:51.763000 audit[2928]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.763000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffefbbcd400 a2=0 a3=7ffefbbcd3ec items=0 ppid=2865 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 08:22:51.766000 audit[2929]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.766000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc114affe0 a2=0 a3=7ffc114affcc items=0 ppid=2865 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 08:22:51.772000 audit[2931]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.772000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1e61e1e0 a2=0 a3=7ffd1e61e1cc items=0 ppid=2865 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 08:22:51.775000 audit[2932]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.775000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc30bec40 a2=0 a3=7fffc30bec2c items=0 ppid=2865 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 08:22:51.782000 audit[2934]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.782000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc9270af90 a2=0 a3=7ffc9270af7c items=0 ppid=2865 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 08:22:51.792000 audit[2937]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.792000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd03e5b020 a2=0 a3=7ffd03e5b00c items=0 ppid=2865 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 08:22:51.794000 audit[2938]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.794000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed6536c40 a2=0 a3=7ffed6536c2c items=0 ppid=2865 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 08:22:51.800000 audit[2940]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.800000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc15aff730 a2=0 a3=7ffc15aff71c items=0 ppid=2865 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 08:22:51.803000 audit[2941]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.803000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd58fb93a0 a2=0 a3=7ffd58fb938c items=0 ppid=2865 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 08:22:51.809000 audit[2943]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.809000 audit[2943]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd04f23a30 a2=0 a3=7ffd04f23a1c items=0 ppid=2865 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:22:51.818000 audit[2946]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.818000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde3ba3400 a2=0 a3=7ffde3ba33ec items=0 ppid=2865 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:22:51.828000 audit[2949]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.828000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef4d08440 a2=0 a3=7ffef4d0842c items=0 ppid=2865 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 08:22:51.830000 audit[2950]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.830000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff0461bed0 a2=0 a3=7fff0461bebc items=0 ppid=2865 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 08:22:51.837000 audit[2952]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.837000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdce29c450 a2=0 a3=7ffdce29c43c items=0 ppid=2865 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:22:51.845000 audit[2955]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.845000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4f9e3c00 a2=0 a3=7ffc4f9e3bec items=0 ppid=2865 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:22:51.848000 audit[2956]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.848000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9c833960 a2=0 a3=7fff9c83394c items=0 ppid=2865 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 08:22:51.854000 audit[2958]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:22:51.854000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffed1983e20 a2=0 a3=7ffed1983e0c items=0 ppid=2865 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 08:22:51.909000 audit[2964]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2964 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:51.909000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff9a5cd9f0 a2=0 a3=7fff9a5cd9dc items=0 ppid=2865 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:51.924000 audit[2964]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:51.924000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff9a5cd9f0 a2=0 a3=7fff9a5cd9dc items=0 ppid=2865 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:51.930000 audit[2969]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.930000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc87e3d400 a2=0 a3=7ffc87e3d3ec items=0 ppid=2865 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 08:22:51.936000 audit[2971]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.936000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdfc250e40 a2=0 a3=7ffdfc250e2c items=0 ppid=2865 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 08:22:51.945000 audit[2974]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.945000 audit[2974]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffea998bdc0 a2=0 a3=7ffea998bdac items=0 ppid=2865 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 08:22:51.948000 audit[2975]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.948000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf9da42d0 a2=0 a3=7ffdf9da42bc items=0 ppid=2865 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 08:22:51.954000 audit[2977]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.954000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd972cf2f0 a2=0 a3=7ffd972cf2dc items=0 ppid=2865 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 08:22:51.956000 audit[2978]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.956000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff770e0540 a2=0 a3=7fff770e052c items=0 ppid=2865 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 08:22:51.963000 audit[2980]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.963000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc1d22b20 a2=0 a3=7ffdc1d22b0c items=0 ppid=2865 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 08:22:51.971000 audit[2983]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.971000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd0cbac4f0 a2=0 a3=7ffd0cbac4dc items=0 ppid=2865 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 08:22:51.974000 audit[2984]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.974000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9e764c40 a2=0 a3=7ffe9e764c2c items=0 ppid=2865 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 08:22:51.980000 audit[2986]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.980000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4e4b5d50 a2=0 a3=7ffc4e4b5d3c items=0 ppid=2865 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 08:22:51.983000 audit[2987]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.983000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe72e47580 a2=0 a3=7ffe72e4756c items=0 ppid=2865 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 08:22:51.989000 audit[2989]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.989000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc607986a0 a2=0 a3=7ffc6079868c items=0 ppid=2865 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.989000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:22:51.998000 audit[2992]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:51.998000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc68c0c8c0 a2=0 a3=7ffc68c0c8ac items=0 ppid=2865 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:51.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 08:22:52.007000 audit[2995]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.007000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeea3f0cb0 a2=0 a3=7ffeea3f0c9c items=0 ppid=2865 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 08:22:52.010000 audit[2996]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.010000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce22f2aa0 a2=0 a3=7ffce22f2a8c items=0 ppid=2865 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 08:22:52.015000 audit[2998]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.015000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffff44b71f0 a2=0 a3=7ffff44b71dc items=0 ppid=2865 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:22:52.023000 audit[3001]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.023000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff19878ea0 a2=0 a3=7fff19878e8c items=0 ppid=2865 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:22:52.026000 audit[3002]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.026000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe70b807c0 a2=0 a3=7ffe70b807ac items=0 ppid=2865 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 08:22:52.032000 audit[3004]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3004 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.032000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc781ae6f0 a2=0 a3=7ffc781ae6dc items=0 ppid=2865 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 08:22:52.034000 audit[3005]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.034000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf4f1c370 a2=0 a3=7ffcf4f1c35c items=0 ppid=2865 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 08:22:52.040000 audit[3007]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.040000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc72ad13e0 a2=0 a3=7ffc72ad13cc items=0 ppid=2865 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:22:52.049000 audit[3010]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3010 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:22:52.049000 audit[3010]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee2d9a0e0 a2=0 a3=7ffee2d9a0cc items=0 ppid=2865 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:22:52.056000 audit[3012]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 08:22:52.056000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd53c93b90 a2=0 a3=7ffd53c93b7c items=0 ppid=2865 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.056000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:52.057000 audit[3012]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 08:22:52.057000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd53c93b90 a2=0 a3=7ffd53c93b7c items=0 ppid=2865 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:52.057000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:52.854171 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2357771074.mount: Deactivated successfully. Jul 2 08:22:53.282393 env[1571]: time="2024-07-02T08:22:53.282339858Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:53.282873 env[1571]: time="2024-07-02T08:22:53.282824319Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:53.283524 env[1571]: time="2024-07-02T08:22:53.283485587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:53.284193 env[1571]: time="2024-07-02T08:22:53.284152232Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:53.284835 env[1571]: time="2024-07-02T08:22:53.284794987Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 08:22:53.285914 env[1571]: time="2024-07-02T08:22:53.285900181Z" level=info msg="CreateContainer within sandbox \"a12b86e26c06466f7cadbfee5588f489032bf826fb260ee6d0e11f8e3cd0508f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 08:22:53.290128 env[1571]: time="2024-07-02T08:22:53.290087454Z" level=info msg="CreateContainer within sandbox \"a12b86e26c06466f7cadbfee5588f489032bf826fb260ee6d0e11f8e3cd0508f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"13693884019eb2c240a8c0ca163529717c1d9c1d3816ad5fd1c88f3f1af5a8f2\"" Jul 2 08:22:53.290392 env[1571]: time="2024-07-02T08:22:53.290341667Z" level=info msg="StartContainer for \"13693884019eb2c240a8c0ca163529717c1d9c1d3816ad5fd1c88f3f1af5a8f2\"" Jul 2 08:22:53.300726 systemd[1]: Started cri-containerd-13693884019eb2c240a8c0ca163529717c1d9c1d3816ad5fd1c88f3f1af5a8f2.scope. Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit: BPF prog-id=111 op=LOAD Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2809 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:53.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363933383834303139656232633234306138633063613136333532 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2809 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:53.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363933383834303139656232633234306138633063613136333532 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit: BPF prog-id=112 op=LOAD Jul 2 08:22:53.305000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000331030 items=0 ppid=2809 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:53.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363933383834303139656232633234306138633063613136333532 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.305000 audit: BPF prog-id=113 op=LOAD Jul 2 08:22:53.305000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000331078 items=0 ppid=2809 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:53.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363933383834303139656232633234306138633063613136333532 Jul 2 08:22:53.306000 audit: BPF prog-id=113 op=UNLOAD Jul 2 08:22:53.306000 audit: BPF prog-id=112 op=UNLOAD Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:53.306000 audit: BPF prog-id=114 op=LOAD Jul 2 08:22:53.306000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000331488 items=0 ppid=2809 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:53.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363933383834303139656232633234306138633063613136333532 Jul 2 08:22:53.311566 env[1571]: time="2024-07-02T08:22:53.311511637Z" level=info msg="StartContainer for \"13693884019eb2c240a8c0ca163529717c1d9c1d3816ad5fd1c88f3f1af5a8f2\" returns successfully" Jul 2 08:22:54.153548 kubelet[2607]: I0702 08:22:54.153511 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-nx64z" podStartSLOduration=4.15349882 podStartE2EDuration="4.15349882s" podCreationTimestamp="2024-07-02 08:22:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 08:22:52.157445027 +0000 UTC m=+15.116284993" watchObservedRunningTime="2024-07-02 08:22:54.15349882 +0000 UTC m=+17.112338733" Jul 2 08:22:54.153821 kubelet[2607]: I0702 08:22:54.153593 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76ff79f7fd-phfss" podStartSLOduration=2.4645044179999998 podStartE2EDuration="4.153587061s" podCreationTimestamp="2024-07-02 08:22:50 +0000 UTC" firstStartedPulling="2024-07-02 08:22:51.596151647 +0000 UTC m=+14.554991552" lastFinishedPulling="2024-07-02 08:22:53.285234282 +0000 UTC m=+16.244074195" observedRunningTime="2024-07-02 08:22:54.153538779 +0000 UTC m=+17.112378694" watchObservedRunningTime="2024-07-02 08:22:54.153587061 +0000 UTC m=+17.112426973" Jul 2 08:22:54.818789 update_engine[1557]: I0702 08:22:54.818665 1557 update_attempter.cc:509] Updating boot flags... Jul 2 08:22:55.980000 audit[3080]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:56.008798 kernel: kauditd_printk_skb: 360 callbacks suppressed Jul 2 08:22:56.008847 kernel: audit: type=1325 audit(1719908575.980:908): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:55.980000 audit[3080]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcfc149210 a2=0 a3=7ffcfc1491fc items=0 ppid=2865 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.094642 kubelet[2607]: I0702 08:22:56.094618 2607 topology_manager.go:215] "Topology Admit Handler" podUID="13457aaf-f8e0-4f13-9580-e417e7ebaa41" podNamespace="calico-system" podName="calico-typha-678fb9b6dd-97xtm" Jul 2 08:22:56.098046 systemd[1]: Created slice kubepods-besteffort-pod13457aaf_f8e0_4f13_9580_e417e7ebaa41.slice. Jul 2 08:22:56.119667 kubelet[2607]: I0702 08:22:56.119621 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/13457aaf-f8e0-4f13-9580-e417e7ebaa41-typha-certs\") pod \"calico-typha-678fb9b6dd-97xtm\" (UID: \"13457aaf-f8e0-4f13-9580-e417e7ebaa41\") " pod="calico-system/calico-typha-678fb9b6dd-97xtm" Jul 2 08:22:56.119667 kubelet[2607]: I0702 08:22:56.119670 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nq7qm\" (UniqueName: \"kubernetes.io/projected/13457aaf-f8e0-4f13-9580-e417e7ebaa41-kube-api-access-nq7qm\") pod \"calico-typha-678fb9b6dd-97xtm\" (UID: \"13457aaf-f8e0-4f13-9580-e417e7ebaa41\") " pod="calico-system/calico-typha-678fb9b6dd-97xtm" Jul 2 08:22:56.119790 kubelet[2607]: I0702 08:22:56.119684 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/13457aaf-f8e0-4f13-9580-e417e7ebaa41-tigera-ca-bundle\") pod \"calico-typha-678fb9b6dd-97xtm\" (UID: \"13457aaf-f8e0-4f13-9580-e417e7ebaa41\") " pod="calico-system/calico-typha-678fb9b6dd-97xtm" Jul 2 08:22:56.165939 kernel: audit: type=1300 audit(1719908575.980:908): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcfc149210 a2=0 a3=7ffcfc1491fc items=0 ppid=2865 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.165988 kernel: audit: type=1327 audit(1719908575.980:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:55.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:56.172279 kubelet[2607]: I0702 08:22:56.172259 2607 topology_manager.go:215] "Topology Admit Handler" podUID="733f745e-b6f0-4560-ac5b-84e51017bdb6" podNamespace="calico-system" podName="calico-node-k5t57" Jul 2 08:22:56.175880 systemd[1]: Created slice kubepods-besteffort-pod733f745e_b6f0_4560_ac5b_84e51017bdb6.slice. Jul 2 08:22:56.220133 kubelet[2607]: I0702 08:22:56.220081 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-lib-modules\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220133 kubelet[2607]: I0702 08:22:56.220106 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-cni-bin-dir\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220133 kubelet[2607]: I0702 08:22:56.220117 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-cni-log-dir\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220133 kubelet[2607]: I0702 08:22:56.220126 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-xtables-lock\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220133 kubelet[2607]: I0702 08:22:56.220136 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/733f745e-b6f0-4560-ac5b-84e51017bdb6-tigera-ca-bundle\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220349 kubelet[2607]: I0702 08:22:56.220197 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-var-run-calico\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220349 kubelet[2607]: I0702 08:22:56.220218 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bjt4h\" (UniqueName: \"kubernetes.io/projected/733f745e-b6f0-4560-ac5b-84e51017bdb6-kube-api-access-bjt4h\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220349 kubelet[2607]: I0702 08:22:56.220233 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-var-lib-calico\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220349 kubelet[2607]: I0702 08:22:56.220249 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-flexvol-driver-host\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220349 kubelet[2607]: I0702 08:22:56.220259 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-policysync\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220483 kubelet[2607]: I0702 08:22:56.220268 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/733f745e-b6f0-4560-ac5b-84e51017bdb6-node-certs\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.220483 kubelet[2607]: I0702 08:22:56.220276 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/733f745e-b6f0-4560-ac5b-84e51017bdb6-cni-net-dir\") pod \"calico-node-k5t57\" (UID: \"733f745e-b6f0-4560-ac5b-84e51017bdb6\") " pod="calico-system/calico-node-k5t57" Jul 2 08:22:56.230124 kubelet[2607]: I0702 08:22:56.230100 2607 topology_manager.go:215] "Topology Admit Handler" podUID="85a5a732-761c-425d-b1b7-35c0263f2e7e" podNamespace="calico-system" podName="csi-node-driver-p2f4l" Jul 2 08:22:56.230279 kubelet[2607]: E0702 08:22:56.230268 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p2f4l" podUID="85a5a732-761c-425d-b1b7-35c0263f2e7e" Jul 2 08:22:55.980000 audit[3080]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:55.980000 audit[3080]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcfc149210 a2=0 a3=0 items=0 ppid=2865 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.320392 kubelet[2607]: I0702 08:22:56.320335 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/85a5a732-761c-425d-b1b7-35c0263f2e7e-kubelet-dir\") pod \"csi-node-driver-p2f4l\" (UID: \"85a5a732-761c-425d-b1b7-35c0263f2e7e\") " pod="calico-system/csi-node-driver-p2f4l" Jul 2 08:22:56.320392 kubelet[2607]: I0702 08:22:56.320354 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/85a5a732-761c-425d-b1b7-35c0263f2e7e-registration-dir\") pod \"csi-node-driver-p2f4l\" (UID: \"85a5a732-761c-425d-b1b7-35c0263f2e7e\") " pod="calico-system/csi-node-driver-p2f4l" Jul 2 08:22:56.320392 kubelet[2607]: I0702 08:22:56.320388 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/85a5a732-761c-425d-b1b7-35c0263f2e7e-varrun\") pod \"csi-node-driver-p2f4l\" (UID: \"85a5a732-761c-425d-b1b7-35c0263f2e7e\") " pod="calico-system/csi-node-driver-p2f4l" Jul 2 08:22:56.320520 kubelet[2607]: I0702 08:22:56.320415 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/85a5a732-761c-425d-b1b7-35c0263f2e7e-socket-dir\") pod \"csi-node-driver-p2f4l\" (UID: \"85a5a732-761c-425d-b1b7-35c0263f2e7e\") " pod="calico-system/csi-node-driver-p2f4l" Jul 2 08:22:56.320520 kubelet[2607]: I0702 08:22:56.320433 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-928zv\" (UniqueName: \"kubernetes.io/projected/85a5a732-761c-425d-b1b7-35c0263f2e7e-kube-api-access-928zv\") pod \"csi-node-driver-p2f4l\" (UID: \"85a5a732-761c-425d-b1b7-35c0263f2e7e\") " pod="calico-system/csi-node-driver-p2f4l" Jul 2 08:22:56.320721 kubelet[2607]: E0702 08:22:56.320697 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.320721 kubelet[2607]: W0702 08:22:56.320708 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.320783 kubelet[2607]: E0702 08:22:56.320727 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.320893 kubelet[2607]: E0702 08:22:56.320856 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.320893 kubelet[2607]: W0702 08:22:56.320863 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.320893 kubelet[2607]: E0702 08:22:56.320873 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.321028 kubelet[2607]: E0702 08:22:56.320991 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.321028 kubelet[2607]: W0702 08:22:56.320998 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.321028 kubelet[2607]: E0702 08:22:56.321007 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.321145 kubelet[2607]: E0702 08:22:56.321105 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.321145 kubelet[2607]: W0702 08:22:56.321112 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.321145 kubelet[2607]: E0702 08:22:56.321122 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.321228 kubelet[2607]: E0702 08:22:56.321205 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.321228 kubelet[2607]: W0702 08:22:56.321211 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.321228 kubelet[2607]: E0702 08:22:56.321218 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.321339 kubelet[2607]: E0702 08:22:56.321304 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.321339 kubelet[2607]: W0702 08:22:56.321314 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.321339 kubelet[2607]: E0702 08:22:56.321323 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.321409 kubelet[2607]: E0702 08:22:56.321404 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.321432 kubelet[2607]: W0702 08:22:56.321409 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.321432 kubelet[2607]: E0702 08:22:56.321416 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.321500 kubelet[2607]: E0702 08:22:56.321495 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.321520 kubelet[2607]: W0702 08:22:56.321501 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.321520 kubelet[2607]: E0702 08:22:56.321508 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.321598 kubelet[2607]: E0702 08:22:56.321593 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.321624 kubelet[2607]: W0702 08:22:56.321598 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.321624 kubelet[2607]: E0702 08:22:56.321603 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.322299 kubelet[2607]: E0702 08:22:56.322291 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.322299 kubelet[2607]: W0702 08:22:56.322297 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.322372 kubelet[2607]: E0702 08:22:56.322303 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.327119 kubelet[2607]: E0702 08:22:56.327108 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.327119 kubelet[2607]: W0702 08:22:56.327116 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.327210 kubelet[2607]: E0702 08:22:56.327124 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.386946 kernel: audit: type=1325 audit(1719908575.980:909): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:56.386987 kernel: audit: type=1300 audit(1719908575.980:909): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcfc149210 a2=0 a3=0 items=0 ppid=2865 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.387010 kernel: audit: type=1327 audit(1719908575.980:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:55.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:56.400320 env[1571]: time="2024-07-02T08:22:56.400296881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-678fb9b6dd-97xtm,Uid:13457aaf-f8e0-4f13-9580-e417e7ebaa41,Namespace:calico-system,Attempt:0,}" Jul 2 08:22:56.407217 env[1571]: time="2024-07-02T08:22:56.407152595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:22:56.407217 env[1571]: time="2024-07-02T08:22:56.407173060Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:22:56.407217 env[1571]: time="2024-07-02T08:22:56.407179735Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:22:56.407326 env[1571]: time="2024-07-02T08:22:56.407247298Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b5fe7d808454663fb6bbe8644464a6b5932f9ef4fb9bf279fd0a4313ee6dff1 pid=3104 runtime=io.containerd.runc.v2 Jul 2 08:22:56.412587 systemd[1]: Started cri-containerd-6b5fe7d808454663fb6bbe8644464a6b5932f9ef4fb9bf279fd0a4313ee6dff1.scope. Jul 2 08:22:56.421522 kubelet[2607]: E0702 08:22:56.421483 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.421522 kubelet[2607]: W0702 08:22:56.421492 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.421522 kubelet[2607]: E0702 08:22:56.421503 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.421699 kubelet[2607]: E0702 08:22:56.421661 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.421699 kubelet[2607]: W0702 08:22:56.421667 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.421699 kubelet[2607]: E0702 08:22:56.421675 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.421876 kubelet[2607]: E0702 08:22:56.421799 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.421876 kubelet[2607]: W0702 08:22:56.421804 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.421876 kubelet[2607]: E0702 08:22:56.421811 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.421933 kubelet[2607]: E0702 08:22:56.421929 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.421954 kubelet[2607]: W0702 08:22:56.421934 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.421954 kubelet[2607]: E0702 08:22:56.421942 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422095 kubelet[2607]: E0702 08:22:56.422057 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422095 kubelet[2607]: W0702 08:22:56.422062 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422095 kubelet[2607]: E0702 08:22:56.422068 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422228 kubelet[2607]: E0702 08:22:56.422190 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422228 kubelet[2607]: W0702 08:22:56.422194 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422228 kubelet[2607]: E0702 08:22:56.422200 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422305 kubelet[2607]: E0702 08:22:56.422268 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422305 kubelet[2607]: W0702 08:22:56.422272 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422305 kubelet[2607]: E0702 08:22:56.422277 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422360 kubelet[2607]: E0702 08:22:56.422348 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422360 kubelet[2607]: W0702 08:22:56.422354 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422397 kubelet[2607]: E0702 08:22:56.422361 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422431 kubelet[2607]: E0702 08:22:56.422425 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422451 kubelet[2607]: W0702 08:22:56.422431 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422451 kubelet[2607]: E0702 08:22:56.422436 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422517 kubelet[2607]: E0702 08:22:56.422511 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422543 kubelet[2607]: W0702 08:22:56.422518 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422543 kubelet[2607]: E0702 08:22:56.422526 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422631 kubelet[2607]: E0702 08:22:56.422598 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422631 kubelet[2607]: W0702 08:22:56.422602 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422631 kubelet[2607]: E0702 08:22:56.422609 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422708 kubelet[2607]: E0702 08:22:56.422672 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422708 kubelet[2607]: W0702 08:22:56.422677 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422708 kubelet[2607]: E0702 08:22:56.422682 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422763 kubelet[2607]: E0702 08:22:56.422744 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422763 kubelet[2607]: W0702 08:22:56.422749 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422763 kubelet[2607]: E0702 08:22:56.422754 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422828 kubelet[2607]: E0702 08:22:56.422822 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422851 kubelet[2607]: W0702 08:22:56.422828 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422851 kubelet[2607]: E0702 08:22:56.422836 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422909 kubelet[2607]: E0702 08:22:56.422904 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.422932 kubelet[2607]: W0702 08:22:56.422909 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.422932 kubelet[2607]: E0702 08:22:56.422915 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.422994 kubelet[2607]: E0702 08:22:56.422990 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423017 kubelet[2607]: W0702 08:22:56.422994 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423017 kubelet[2607]: E0702 08:22:56.422999 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423073 kubelet[2607]: E0702 08:22:56.423068 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423095 kubelet[2607]: W0702 08:22:56.423073 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423095 kubelet[2607]: E0702 08:22:56.423080 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423152 kubelet[2607]: E0702 08:22:56.423146 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423175 kubelet[2607]: W0702 08:22:56.423152 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423175 kubelet[2607]: E0702 08:22:56.423157 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423224 kubelet[2607]: E0702 08:22:56.423219 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423243 kubelet[2607]: W0702 08:22:56.423224 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423243 kubelet[2607]: E0702 08:22:56.423230 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423310 kubelet[2607]: E0702 08:22:56.423305 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423330 kubelet[2607]: W0702 08:22:56.423310 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423330 kubelet[2607]: E0702 08:22:56.423315 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423383 kubelet[2607]: E0702 08:22:56.423378 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423404 kubelet[2607]: W0702 08:22:56.423383 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423404 kubelet[2607]: E0702 08:22:56.423389 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423471 kubelet[2607]: E0702 08:22:56.423466 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423490 kubelet[2607]: W0702 08:22:56.423471 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423490 kubelet[2607]: E0702 08:22:56.423476 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423571 kubelet[2607]: E0702 08:22:56.423564 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423597 kubelet[2607]: W0702 08:22:56.423570 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423597 kubelet[2607]: E0702 08:22:56.423577 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423653 kubelet[2607]: E0702 08:22:56.423648 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423672 kubelet[2607]: W0702 08:22:56.423653 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423672 kubelet[2607]: E0702 08:22:56.423657 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.423794 kubelet[2607]: E0702 08:22:56.423787 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.423794 kubelet[2607]: W0702 08:22:56.423792 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.423840 kubelet[2607]: E0702 08:22:56.423797 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.428889 kubelet[2607]: E0702 08:22:56.428852 2607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:22:56.428889 kubelet[2607]: W0702 08:22:56.428860 2607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:22:56.428889 kubelet[2607]: E0702 08:22:56.428866 2607 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:22:56.231000 audit[3084]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:56.478156 env[1571]: time="2024-07-02T08:22:56.478107712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-k5t57,Uid:733f745e-b6f0-4560-ac5b-84e51017bdb6,Namespace:calico-system,Attempt:0,}" Jul 2 08:22:56.484725 env[1571]: time="2024-07-02T08:22:56.484692317Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:22:56.484725 env[1571]: time="2024-07-02T08:22:56.484713782Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:22:56.484725 env[1571]: time="2024-07-02T08:22:56.484720670Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:22:56.484884 env[1571]: time="2024-07-02T08:22:56.484784832Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848 pid=3163 runtime=io.containerd.runc.v2 Jul 2 08:22:56.231000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff2614ccc0 a2=0 a3=7fff2614ccac items=0 ppid=2865 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.604470 kernel: audit: type=1325 audit(1719908576.231:910): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:56.604545 kernel: audit: type=1300 audit(1719908576.231:910): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff2614ccc0 a2=0 a3=7fff2614ccac items=0 ppid=2865 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.604572 kernel: audit: type=1327 audit(1719908576.231:910): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:56.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:56.606067 systemd[1]: Started cri-containerd-dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848.scope. Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727246 kernel: audit: type=1400 audit(1719908576.451:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.602000 audit: BPF prog-id=115 op=LOAD Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3104 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662356665376438303834353436363366623662626538363434343634 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3104 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662356665376438303834353436363366623662626538363434343634 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.603000 audit: BPF prog-id=116 op=LOAD Jul 2 08:22:56.726000 audit: BPF prog-id=117 op=LOAD Jul 2 08:22:56.603000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000318da0 items=0 ppid=3104 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662356665376438303834353436363366623662626538363434343634 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit: BPF prog-id=118 op=LOAD Jul 2 08:22:56.726000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000318de8 items=0 ppid=3104 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662356665376438303834353436363366623662626538363434343634 Jul 2 08:22:56.726000 audit: BPF prog-id=118 op=UNLOAD Jul 2 08:22:56.726000 audit: BPF prog-id=116 op=UNLOAD Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.726000 audit: BPF prog-id=119 op=LOAD Jul 2 08:22:56.726000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003191f8 items=0 ppid=3104 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662356665376438303834353436363366623662626538363434343634 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3163 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333133653932623262323265636634633738363438643933383762 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3163 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333133653932623262323265636634633738363438643933383762 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit: BPF prog-id=120 op=LOAD Jul 2 08:22:56.727000 audit[3172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025370 items=0 ppid=3163 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333133653932623262323265636634633738363438643933383762 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit: BPF prog-id=121 op=LOAD Jul 2 08:22:56.727000 audit[3172]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000253b8 items=0 ppid=3163 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333133653932623262323265636634633738363438643933383762 Jul 2 08:22:56.727000 audit: BPF prog-id=121 op=UNLOAD Jul 2 08:22:56.727000 audit: BPF prog-id=120 op=UNLOAD Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:56.727000 audit: BPF prog-id=122 op=LOAD Jul 2 08:22:56.727000 audit[3172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000257c8 items=0 ppid=3163 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333133653932623262323265636634633738363438643933383762 Jul 2 08:22:56.732201 env[1571]: time="2024-07-02T08:22:56.732174714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-k5t57,Uid:733f745e-b6f0-4560-ac5b-84e51017bdb6,Namespace:calico-system,Attempt:0,} returns sandbox id \"dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848\"" Jul 2 08:22:56.732946 env[1571]: time="2024-07-02T08:22:56.732932375Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 08:22:56.445000 audit[3084]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:22:56.445000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff2614ccc0 a2=0 a3=0 items=0 ppid=2865 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:56.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:22:56.745160 env[1571]: time="2024-07-02T08:22:56.745134678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-678fb9b6dd-97xtm,Uid:13457aaf-f8e0-4f13-9580-e417e7ebaa41,Namespace:calico-system,Attempt:0,} returns sandbox id \"6b5fe7d808454663fb6bbe8644464a6b5932f9ef4fb9bf279fd0a4313ee6dff1\"" Jul 2 08:22:57.985884 env[1571]: time="2024-07-02T08:22:57.985857372Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:57.986378 env[1571]: time="2024-07-02T08:22:57.986337525Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:57.987047 env[1571]: time="2024-07-02T08:22:57.987026317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:57.988025 env[1571]: time="2024-07-02T08:22:57.988011136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:57.988207 env[1571]: time="2024-07-02T08:22:57.988191631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 08:22:57.988811 env[1571]: time="2024-07-02T08:22:57.988800417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 08:22:57.989294 env[1571]: time="2024-07-02T08:22:57.989277625Z" level=info msg="CreateContainer within sandbox \"dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 08:22:57.994104 env[1571]: time="2024-07-02T08:22:57.994060255Z" level=info msg="CreateContainer within sandbox \"dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4bf2807ea47497237b67293519787ce595af1f369ae9ae5dc0fa66b8cf59d001\"" Jul 2 08:22:57.994308 env[1571]: time="2024-07-02T08:22:57.994274534Z" level=info msg="StartContainer for \"4bf2807ea47497237b67293519787ce595af1f369ae9ae5dc0fa66b8cf59d001\"" Jul 2 08:22:58.003156 systemd[1]: Started cri-containerd-4bf2807ea47497237b67293519787ce595af1f369ae9ae5dc0fa66b8cf59d001.scope. Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f934de312f8 items=0 ppid=3163 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:58.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663238303765613437343937323337623637323933353139373837 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit: BPF prog-id=123 op=LOAD Jul 2 08:22:58.009000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000024a68 items=0 ppid=3163 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:58.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663238303765613437343937323337623637323933353139373837 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit: BPF prog-id=124 op=LOAD Jul 2 08:22:58.009000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024ab8 items=0 ppid=3163 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:58.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663238303765613437343937323337623637323933353139373837 Jul 2 08:22:58.009000 audit: BPF prog-id=124 op=UNLOAD Jul 2 08:22:58.009000 audit: BPF prog-id=123 op=UNLOAD Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:58.009000 audit: BPF prog-id=125 op=LOAD Jul 2 08:22:58.009000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000024b48 items=0 ppid=3163 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:58.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663238303765613437343937323337623637323933353139373837 Jul 2 08:22:58.015725 env[1571]: time="2024-07-02T08:22:58.015677883Z" level=info msg="StartContainer for \"4bf2807ea47497237b67293519787ce595af1f369ae9ae5dc0fa66b8cf59d001\" returns successfully" Jul 2 08:22:58.021201 systemd[1]: cri-containerd-4bf2807ea47497237b67293519787ce595af1f369ae9ae5dc0fa66b8cf59d001.scope: Deactivated successfully. Jul 2 08:22:58.027000 audit: BPF prog-id=125 op=UNLOAD Jul 2 08:22:58.030487 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4bf2807ea47497237b67293519787ce595af1f369ae9ae5dc0fa66b8cf59d001-rootfs.mount: Deactivated successfully. Jul 2 08:22:58.098766 kubelet[2607]: E0702 08:22:58.098638 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p2f4l" podUID="85a5a732-761c-425d-b1b7-35c0263f2e7e" Jul 2 08:22:58.223663 env[1571]: time="2024-07-02T08:22:58.223598951Z" level=info msg="shim disconnected" id=4bf2807ea47497237b67293519787ce595af1f369ae9ae5dc0fa66b8cf59d001 Jul 2 08:22:58.223922 env[1571]: time="2024-07-02T08:22:58.223667058Z" level=warning msg="cleaning up after shim disconnected" id=4bf2807ea47497237b67293519787ce595af1f369ae9ae5dc0fa66b8cf59d001 namespace=k8s.io Jul 2 08:22:58.223922 env[1571]: time="2024-07-02T08:22:58.223689446Z" level=info msg="cleaning up dead shim" Jul 2 08:22:58.232589 env[1571]: time="2024-07-02T08:22:58.232530656Z" level=warning msg="cleanup warnings time=\"2024-07-02T08:22:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3254 runtime=io.containerd.runc.v2\n" Jul 2 08:22:59.693016 env[1571]: time="2024-07-02T08:22:59.692963321Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:59.693522 env[1571]: time="2024-07-02T08:22:59.693507666Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:59.694090 env[1571]: time="2024-07-02T08:22:59.694077524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:59.694678 env[1571]: time="2024-07-02T08:22:59.694665269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:22:59.694983 env[1571]: time="2024-07-02T08:22:59.694969927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 08:22:59.695645 env[1571]: time="2024-07-02T08:22:59.695632380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 08:22:59.699498 env[1571]: time="2024-07-02T08:22:59.699476817Z" level=info msg="CreateContainer within sandbox \"6b5fe7d808454663fb6bbe8644464a6b5932f9ef4fb9bf279fd0a4313ee6dff1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 08:22:59.704674 env[1571]: time="2024-07-02T08:22:59.704653270Z" level=info msg="CreateContainer within sandbox \"6b5fe7d808454663fb6bbe8644464a6b5932f9ef4fb9bf279fd0a4313ee6dff1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e260690c2a225a7b4be1446b9a02a8b4a8908ca6799b21e496aa55a16f6560a7\"" Jul 2 08:22:59.704906 env[1571]: time="2024-07-02T08:22:59.704893639Z" level=info msg="StartContainer for \"e260690c2a225a7b4be1446b9a02a8b4a8908ca6799b21e496aa55a16f6560a7\"" Jul 2 08:22:59.713838 systemd[1]: Started cri-containerd-e260690c2a225a7b4be1446b9a02a8b4a8908ca6799b21e496aa55a16f6560a7.scope. Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit: BPF prog-id=126 op=LOAD Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3104 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:59.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363036393063326132323561376234626531343436623961303261 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3104 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:59.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363036393063326132323561376234626531343436623961303261 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit: BPF prog-id=127 op=LOAD Jul 2 08:22:59.719000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000300c00 items=0 ppid=3104 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:59.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363036393063326132323561376234626531343436623961303261 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit: BPF prog-id=128 op=LOAD Jul 2 08:22:59.719000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000300c48 items=0 ppid=3104 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:59.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363036393063326132323561376234626531343436623961303261 Jul 2 08:22:59.719000 audit: BPF prog-id=128 op=UNLOAD Jul 2 08:22:59.719000 audit: BPF prog-id=127 op=UNLOAD Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:22:59.719000 audit: BPF prog-id=129 op=LOAD Jul 2 08:22:59.719000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000301058 items=0 ppid=3104 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:22:59.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363036393063326132323561376234626531343436623961303261 Jul 2 08:22:59.736528 env[1571]: time="2024-07-02T08:22:59.736475859Z" level=info msg="StartContainer for \"e260690c2a225a7b4be1446b9a02a8b4a8908ca6799b21e496aa55a16f6560a7\" returns successfully" Jul 2 08:23:00.098706 kubelet[2607]: E0702 08:23:00.098547 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p2f4l" podUID="85a5a732-761c-425d-b1b7-35c0263f2e7e" Jul 2 08:23:01.167822 kubelet[2607]: I0702 08:23:01.167777 2607 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 08:23:02.098633 kubelet[2607]: E0702 08:23:02.098574 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p2f4l" podUID="85a5a732-761c-425d-b1b7-35c0263f2e7e" Jul 2 08:23:02.608945 env[1571]: time="2024-07-02T08:23:02.608893679Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:02.609474 env[1571]: time="2024-07-02T08:23:02.609435238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:02.610308 env[1571]: time="2024-07-02T08:23:02.610267943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:02.610935 env[1571]: time="2024-07-02T08:23:02.610891909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:02.611531 env[1571]: time="2024-07-02T08:23:02.611493801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 08:23:02.612948 env[1571]: time="2024-07-02T08:23:02.612911192Z" level=info msg="CreateContainer within sandbox \"dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 08:23:02.618257 env[1571]: time="2024-07-02T08:23:02.618213608Z" level=info msg="CreateContainer within sandbox \"dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c532bc4f544dcbe5aa1d0d6b489f6cf75a4416e4885bac237b58ebe9cadb8222\"" Jul 2 08:23:02.618544 env[1571]: time="2024-07-02T08:23:02.618514877Z" level=info msg="StartContainer for \"c532bc4f544dcbe5aa1d0d6b489f6cf75a4416e4885bac237b58ebe9cadb8222\"" Jul 2 08:23:02.628020 systemd[1]: Started cri-containerd-c532bc4f544dcbe5aa1d0d6b489f6cf75a4416e4885bac237b58ebe9cadb8222.scope. Jul 2 08:23:02.633000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.663390 kernel: kauditd_printk_skb: 217 callbacks suppressed Jul 2 08:23:02.663429 kernel: audit: type=1400 audit(1719908582.633:973): avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.633000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe09b97a228 items=0 ppid=3163 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:02.728616 kernel: audit: type=1300 audit(1719908582.633:973): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe09b97a228 items=0 ppid=3163 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:02.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333262633466353434646362653561613164306436623438396636 Jul 2 08:23:02.919334 kernel: audit: type=1327 audit(1719908582.633:973): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333262633466353434646362653561613164306436623438396636 Jul 2 08:23:02.919367 kernel: audit: type=1400 audit(1719908582.634:974): avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.983069 kernel: audit: type=1400 audit(1719908582.634:974): avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:03.046879 kernel: audit: type=1400 audit(1719908582.634:974): avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:03.110690 kernel: audit: type=1400 audit(1719908582.634:974): avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:03.174840 kernel: audit: type=1400 audit(1719908582.634:974): avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:03.239051 kernel: audit: type=1400 audit(1719908582.634:974): avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:03.239353 env[1571]: time="2024-07-02T08:23:03.239332499Z" level=info msg="StartContainer for \"c532bc4f544dcbe5aa1d0d6b489f6cf75a4416e4885bac237b58ebe9cadb8222\" returns successfully" Jul 2 08:23:03.303275 kernel: audit: type=1400 audit(1719908582.634:974): avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.634000 audit: BPF prog-id=130 op=LOAD Jul 2 08:23:02.634000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c5c88 items=0 ppid=3163 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:02.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333262633466353434646362653561613164306436623438396636 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.726000 audit: BPF prog-id=131 op=LOAD Jul 2 08:23:02.726000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002c5cd8 items=0 ppid=3163 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:02.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333262633466353434646362653561613164306436623438396636 Jul 2 08:23:02.917000 audit: BPF prog-id=131 op=UNLOAD Jul 2 08:23:02.917000 audit: BPF prog-id=130 op=UNLOAD Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:02.917000 audit: BPF prog-id=132 op=LOAD Jul 2 08:23:02.917000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002c5d68 items=0 ppid=3163 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:02.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333262633466353434646362653561613164306436623438396636 Jul 2 08:23:03.808872 env[1571]: time="2024-07-02T08:23:03.808758351Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 08:23:03.812116 systemd[1]: cri-containerd-c532bc4f544dcbe5aa1d0d6b489f6cf75a4416e4885bac237b58ebe9cadb8222.scope: Deactivated successfully. Jul 2 08:23:03.820000 audit: BPF prog-id=132 op=UNLOAD Jul 2 08:23:03.851459 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c532bc4f544dcbe5aa1d0d6b489f6cf75a4416e4885bac237b58ebe9cadb8222-rootfs.mount: Deactivated successfully. Jul 2 08:23:03.917225 kubelet[2607]: I0702 08:23:03.917134 2607 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 08:23:03.949994 kubelet[2607]: I0702 08:23:03.949858 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-678fb9b6dd-97xtm" podStartSLOduration=4.999962919 podStartE2EDuration="7.949811909s" podCreationTimestamp="2024-07-02 08:22:56 +0000 UTC" firstStartedPulling="2024-07-02 08:22:56.74571035 +0000 UTC m=+19.704550258" lastFinishedPulling="2024-07-02 08:22:59.695559342 +0000 UTC m=+22.654399248" observedRunningTime="2024-07-02 08:23:00.20205458 +0000 UTC m=+23.160894525" watchObservedRunningTime="2024-07-02 08:23:03.949811909 +0000 UTC m=+26.908651859" Jul 2 08:23:03.952159 kubelet[2607]: I0702 08:23:03.952086 2607 topology_manager.go:215] "Topology Admit Handler" podUID="ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f" podNamespace="kube-system" podName="coredns-7db6d8ff4d-gfsgs" Jul 2 08:23:03.953430 kubelet[2607]: I0702 08:23:03.953320 2607 topology_manager.go:215] "Topology Admit Handler" podUID="0c293c6c-0ee4-43d7-a767-415ecbdd45dd" podNamespace="calico-system" podName="calico-kube-controllers-b5946468f-wsv8p" Jul 2 08:23:03.954812 kubelet[2607]: I0702 08:23:03.954617 2607 topology_manager.go:215] "Topology Admit Handler" podUID="deaa368b-02e9-4638-9ae0-7c4d5931182e" podNamespace="kube-system" podName="coredns-7db6d8ff4d-2cvcs" Jul 2 08:23:03.967329 systemd[1]: Created slice kubepods-burstable-podab2d36ff_a7bc_4bc3_bc42_92fabcd96c4f.slice. Jul 2 08:23:03.972203 kubelet[2607]: I0702 08:23:03.972134 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/deaa368b-02e9-4638-9ae0-7c4d5931182e-config-volume\") pod \"coredns-7db6d8ff4d-2cvcs\" (UID: \"deaa368b-02e9-4638-9ae0-7c4d5931182e\") " pod="kube-system/coredns-7db6d8ff4d-2cvcs" Jul 2 08:23:03.972454 kubelet[2607]: I0702 08:23:03.972219 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l42gm\" (UniqueName: \"kubernetes.io/projected/deaa368b-02e9-4638-9ae0-7c4d5931182e-kube-api-access-l42gm\") pod \"coredns-7db6d8ff4d-2cvcs\" (UID: \"deaa368b-02e9-4638-9ae0-7c4d5931182e\") " pod="kube-system/coredns-7db6d8ff4d-2cvcs" Jul 2 08:23:03.972454 kubelet[2607]: I0702 08:23:03.972376 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0c293c6c-0ee4-43d7-a767-415ecbdd45dd-tigera-ca-bundle\") pod \"calico-kube-controllers-b5946468f-wsv8p\" (UID: \"0c293c6c-0ee4-43d7-a767-415ecbdd45dd\") " pod="calico-system/calico-kube-controllers-b5946468f-wsv8p" Jul 2 08:23:03.972771 kubelet[2607]: I0702 08:23:03.972552 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h27qm\" (UniqueName: \"kubernetes.io/projected/0c293c6c-0ee4-43d7-a767-415ecbdd45dd-kube-api-access-h27qm\") pod \"calico-kube-controllers-b5946468f-wsv8p\" (UID: \"0c293c6c-0ee4-43d7-a767-415ecbdd45dd\") " pod="calico-system/calico-kube-controllers-b5946468f-wsv8p" Jul 2 08:23:03.972771 kubelet[2607]: I0702 08:23:03.972683 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f-config-volume\") pod \"coredns-7db6d8ff4d-gfsgs\" (UID: \"ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f\") " pod="kube-system/coredns-7db6d8ff4d-gfsgs" Jul 2 08:23:03.972771 kubelet[2607]: I0702 08:23:03.972746 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltrdf\" (UniqueName: \"kubernetes.io/projected/ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f-kube-api-access-ltrdf\") pod \"coredns-7db6d8ff4d-gfsgs\" (UID: \"ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f\") " pod="kube-system/coredns-7db6d8ff4d-gfsgs" Jul 2 08:23:03.980059 systemd[1]: Created slice kubepods-besteffort-pod0c293c6c_0ee4_43d7_a767_415ecbdd45dd.slice. Jul 2 08:23:03.989144 systemd[1]: Created slice kubepods-burstable-poddeaa368b_02e9_4638_9ae0_7c4d5931182e.slice. Jul 2 08:23:04.123110 systemd[1]: Created slice kubepods-besteffort-pod85a5a732_761c_425d_b1b7_35c0263f2e7e.slice. Jul 2 08:23:04.125536 env[1571]: time="2024-07-02T08:23:04.125471881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p2f4l,Uid:85a5a732-761c-425d-b1b7-35c0263f2e7e,Namespace:calico-system,Attempt:0,}" Jul 2 08:23:04.274050 env[1571]: time="2024-07-02T08:23:04.273923701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-gfsgs,Uid:ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f,Namespace:kube-system,Attempt:0,}" Jul 2 08:23:04.286485 env[1571]: time="2024-07-02T08:23:04.286372574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b5946468f-wsv8p,Uid:0c293c6c-0ee4-43d7-a767-415ecbdd45dd,Namespace:calico-system,Attempt:0,}" Jul 2 08:23:04.297768 env[1571]: time="2024-07-02T08:23:04.297663518Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2cvcs,Uid:deaa368b-02e9-4638-9ae0-7c4d5931182e,Namespace:kube-system,Attempt:0,}" Jul 2 08:23:04.434762 env[1571]: time="2024-07-02T08:23:04.434473561Z" level=info msg="shim disconnected" id=c532bc4f544dcbe5aa1d0d6b489f6cf75a4416e4885bac237b58ebe9cadb8222 Jul 2 08:23:04.434762 env[1571]: time="2024-07-02T08:23:04.434629550Z" level=warning msg="cleaning up after shim disconnected" id=c532bc4f544dcbe5aa1d0d6b489f6cf75a4416e4885bac237b58ebe9cadb8222 namespace=k8s.io Jul 2 08:23:04.434762 env[1571]: time="2024-07-02T08:23:04.434667633Z" level=info msg="cleaning up dead shim" Jul 2 08:23:04.451279 env[1571]: time="2024-07-02T08:23:04.451138603Z" level=warning msg="cleanup warnings time=\"2024-07-02T08:23:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3377 runtime=io.containerd.runc.v2\n" Jul 2 08:23:04.496306 env[1571]: time="2024-07-02T08:23:04.496219668Z" level=error msg="Failed to destroy network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496482 env[1571]: time="2024-07-02T08:23:04.496465003Z" level=error msg="encountered an error cleaning up failed sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496514 env[1571]: time="2024-07-02T08:23:04.496497681Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p2f4l,Uid:85a5a732-761c-425d-b1b7-35c0263f2e7e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496587 env[1571]: time="2024-07-02T08:23:04.496566565Z" level=error msg="Failed to destroy network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496714 kubelet[2607]: E0702 08:23:04.496652 2607 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496714 kubelet[2607]: E0702 08:23:04.496707 2607 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p2f4l" Jul 2 08:23:04.496809 kubelet[2607]: E0702 08:23:04.496727 2607 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p2f4l" Jul 2 08:23:04.496809 kubelet[2607]: E0702 08:23:04.496759 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-p2f4l_calico-system(85a5a732-761c-425d-b1b7-35c0263f2e7e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-p2f4l_calico-system(85a5a732-761c-425d-b1b7-35c0263f2e7e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p2f4l" podUID="85a5a732-761c-425d-b1b7-35c0263f2e7e" Jul 2 08:23:04.496895 env[1571]: time="2024-07-02T08:23:04.496709952Z" level=error msg="Failed to destroy network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496895 env[1571]: time="2024-07-02T08:23:04.496731636Z" level=error msg="encountered an error cleaning up failed sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496895 env[1571]: time="2024-07-02T08:23:04.496764344Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2cvcs,Uid:deaa368b-02e9-4638-9ae0-7c4d5931182e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496977 kubelet[2607]: E0702 08:23:04.496846 2607 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.496977 kubelet[2607]: E0702 08:23:04.496882 2607 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-2cvcs" Jul 2 08:23:04.496977 kubelet[2607]: E0702 08:23:04.496901 2607 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-2cvcs" Jul 2 08:23:04.497074 kubelet[2607]: E0702 08:23:04.496933 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-2cvcs_kube-system(deaa368b-02e9-4638-9ae0-7c4d5931182e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-2cvcs_kube-system(deaa368b-02e9-4638-9ae0-7c4d5931182e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-2cvcs" podUID="deaa368b-02e9-4638-9ae0-7c4d5931182e" Jul 2 08:23:04.497156 env[1571]: time="2024-07-02T08:23:04.497120382Z" level=error msg="encountered an error cleaning up failed sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.497205 env[1571]: time="2024-07-02T08:23:04.497171249Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b5946468f-wsv8p,Uid:0c293c6c-0ee4-43d7-a767-415ecbdd45dd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.497311 kubelet[2607]: E0702 08:23:04.497292 2607 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.497378 kubelet[2607]: E0702 08:23:04.497322 2607 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-b5946468f-wsv8p" Jul 2 08:23:04.497378 kubelet[2607]: E0702 08:23:04.497338 2607 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-b5946468f-wsv8p" Jul 2 08:23:04.497454 kubelet[2607]: E0702 08:23:04.497375 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-b5946468f-wsv8p_calico-system(0c293c6c-0ee4-43d7-a767-415ecbdd45dd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-b5946468f-wsv8p_calico-system(0c293c6c-0ee4-43d7-a767-415ecbdd45dd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-b5946468f-wsv8p" podUID="0c293c6c-0ee4-43d7-a767-415ecbdd45dd" Jul 2 08:23:04.498450 env[1571]: time="2024-07-02T08:23:04.498422808Z" level=error msg="Failed to destroy network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.498665 env[1571]: time="2024-07-02T08:23:04.498649363Z" level=error msg="encountered an error cleaning up failed sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.498697 env[1571]: time="2024-07-02T08:23:04.498672515Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-gfsgs,Uid:ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.498760 kubelet[2607]: E0702 08:23:04.498746 2607 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:04.498801 kubelet[2607]: E0702 08:23:04.498771 2607 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-gfsgs" Jul 2 08:23:04.498801 kubelet[2607]: E0702 08:23:04.498787 2607 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-gfsgs" Jul 2 08:23:04.498866 kubelet[2607]: E0702 08:23:04.498813 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-gfsgs_kube-system(ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-gfsgs_kube-system(ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-gfsgs" podUID="ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f" Jul 2 08:23:04.851818 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110-shm.mount: Deactivated successfully. Jul 2 08:23:04.851869 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd-shm.mount: Deactivated successfully. Jul 2 08:23:04.851901 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f-shm.mount: Deactivated successfully. Jul 2 08:23:04.851932 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27-shm.mount: Deactivated successfully. Jul 2 08:23:05.251364 kubelet[2607]: I0702 08:23:05.251269 2607 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:05.252236 env[1571]: time="2024-07-02T08:23:05.251310575Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 08:23:05.252975 env[1571]: time="2024-07-02T08:23:05.252526038Z" level=info msg="StopPodSandbox for \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\"" Jul 2 08:23:05.253585 kubelet[2607]: I0702 08:23:05.253515 2607 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:05.254759 env[1571]: time="2024-07-02T08:23:05.254719243Z" level=info msg="StopPodSandbox for \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\"" Jul 2 08:23:05.254927 kubelet[2607]: I0702 08:23:05.254917 2607 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:05.255199 env[1571]: time="2024-07-02T08:23:05.255181103Z" level=info msg="StopPodSandbox for \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\"" Jul 2 08:23:05.255352 kubelet[2607]: I0702 08:23:05.255343 2607 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:05.255578 env[1571]: time="2024-07-02T08:23:05.255562838Z" level=info msg="StopPodSandbox for \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\"" Jul 2 08:23:05.268208 env[1571]: time="2024-07-02T08:23:05.268146796Z" level=error msg="StopPodSandbox for \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\" failed" error="failed to destroy network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:05.268380 kubelet[2607]: E0702 08:23:05.268360 2607 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:05.268430 kubelet[2607]: E0702 08:23:05.268397 2607 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd"} Jul 2 08:23:05.268455 kubelet[2607]: E0702 08:23:05.268445 2607 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0c293c6c-0ee4-43d7-a767-415ecbdd45dd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 08:23:05.268511 kubelet[2607]: E0702 08:23:05.268460 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0c293c6c-0ee4-43d7-a767-415ecbdd45dd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-b5946468f-wsv8p" podUID="0c293c6c-0ee4-43d7-a767-415ecbdd45dd" Jul 2 08:23:05.268948 env[1571]: time="2024-07-02T08:23:05.268891911Z" level=error msg="StopPodSandbox for \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\" failed" error="failed to destroy network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:05.269102 kubelet[2607]: E0702 08:23:05.269050 2607 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:05.269102 kubelet[2607]: E0702 08:23:05.269070 2607 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27"} Jul 2 08:23:05.269102 kubelet[2607]: E0702 08:23:05.269099 2607 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"85a5a732-761c-425d-b1b7-35c0263f2e7e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 08:23:05.269312 kubelet[2607]: E0702 08:23:05.269128 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"85a5a732-761c-425d-b1b7-35c0263f2e7e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p2f4l" podUID="85a5a732-761c-425d-b1b7-35c0263f2e7e" Jul 2 08:23:05.269476 env[1571]: time="2024-07-02T08:23:05.269459098Z" level=error msg="StopPodSandbox for \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\" failed" error="failed to destroy network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:05.269536 kubelet[2607]: E0702 08:23:05.269523 2607 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:05.269567 kubelet[2607]: E0702 08:23:05.269540 2607 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110"} Jul 2 08:23:05.269567 kubelet[2607]: E0702 08:23:05.269557 2607 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"deaa368b-02e9-4638-9ae0-7c4d5931182e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 08:23:05.269681 kubelet[2607]: E0702 08:23:05.269571 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"deaa368b-02e9-4638-9ae0-7c4d5931182e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-2cvcs" podUID="deaa368b-02e9-4638-9ae0-7c4d5931182e" Jul 2 08:23:05.270395 env[1571]: time="2024-07-02T08:23:05.270379329Z" level=error msg="StopPodSandbox for \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\" failed" error="failed to destroy network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:23:05.270483 kubelet[2607]: E0702 08:23:05.270471 2607 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:05.270511 kubelet[2607]: E0702 08:23:05.270488 2607 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f"} Jul 2 08:23:05.270511 kubelet[2607]: E0702 08:23:05.270501 2607 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 08:23:05.270567 kubelet[2607]: E0702 08:23:05.270513 2607 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-gfsgs" podUID="ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f" Jul 2 08:23:09.203411 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount189334571.mount: Deactivated successfully. Jul 2 08:23:09.220044 env[1571]: time="2024-07-02T08:23:09.220022318Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:09.220665 env[1571]: time="2024-07-02T08:23:09.220605679Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:09.221208 env[1571]: time="2024-07-02T08:23:09.221196182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:09.222178 env[1571]: time="2024-07-02T08:23:09.222164728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:09.222341 env[1571]: time="2024-07-02T08:23:09.222315344Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 08:23:09.226343 env[1571]: time="2024-07-02T08:23:09.226322771Z" level=info msg="CreateContainer within sandbox \"dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 08:23:09.231699 env[1571]: time="2024-07-02T08:23:09.231678835Z" level=info msg="CreateContainer within sandbox \"dc313e92b2b22ecf4c78648d9387b619c250daa5bfee74a1f2415a0d6c660848\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d3aebdcab55105dfd1d6f5051742c1939f6d273d254aaace2ca1b1c7efa642c6\"" Jul 2 08:23:09.231924 env[1571]: time="2024-07-02T08:23:09.231906048Z" level=info msg="StartContainer for \"d3aebdcab55105dfd1d6f5051742c1939f6d273d254aaace2ca1b1c7efa642c6\"" Jul 2 08:23:09.240220 systemd[1]: Started cri-containerd-d3aebdcab55105dfd1d6f5051742c1939f6d273d254aaace2ca1b1c7efa642c6.scope. Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.275819 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 08:23:09.275878 kernel: audit: type=1400 audit(1719908589.248:980): avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7efe074efe78 items=0 ppid=3163 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:09.437712 kernel: audit: type=1300 audit(1719908589.248:980): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7efe074efe78 items=0 ppid=3163 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:09.437746 kernel: audit: type=1327 audit(1719908589.248:980): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616562646361623535313035646664316436663530353137343263 Jul 2 08:23:09.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616562646361623535313035646664316436663530353137343263 Jul 2 08:23:09.531259 kernel: audit: type=1400 audit(1719908589.248:981): avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.594918 kernel: audit: type=1400 audit(1719908589.248:981): avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.658462 kernel: audit: type=1400 audit(1719908589.248:981): avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.721983 kernel: audit: type=1400 audit(1719908589.248:981): avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.727882 env[1571]: time="2024-07-02T08:23:09.727825427Z" level=info msg="StartContainer for \"d3aebdcab55105dfd1d6f5051742c1939f6d273d254aaace2ca1b1c7efa642c6\" returns successfully" Jul 2 08:23:09.785869 kernel: audit: type=1400 audit(1719908589.248:981): avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.849872 kernel: audit: type=1400 audit(1719908589.248:981): avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.913764 kernel: audit: type=1400 audit(1719908589.248:981): avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.248000 audit: BPF prog-id=133 op=LOAD Jul 2 08:23:09.248000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00026fc58 items=0 ppid=3163 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:09.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616562646361623535313035646664316436663530353137343263 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.339000 audit: BPF prog-id=134 op=LOAD Jul 2 08:23:09.339000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00026fca8 items=0 ppid=3163 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:09.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616562646361623535313035646664316436663530353137343263 Jul 2 08:23:09.530000 audit: BPF prog-id=134 op=UNLOAD Jul 2 08:23:09.530000 audit: BPF prog-id=133 op=UNLOAD Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:09.530000 audit: BPF prog-id=135 op=LOAD Jul 2 08:23:09.530000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00026fd38 items=0 ppid=3163 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:09.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616562646361623535313035646664316436663530353137343263 Jul 2 08:23:10.061377 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 08:23:10.061413 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 08:23:10.292630 kubelet[2607]: I0702 08:23:10.292493 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-k5t57" podStartSLOduration=1.802411073 podStartE2EDuration="14.292449757s" podCreationTimestamp="2024-07-02 08:22:56 +0000 UTC" firstStartedPulling="2024-07-02 08:22:56.732797622 +0000 UTC m=+19.691637529" lastFinishedPulling="2024-07-02 08:23:09.222836305 +0000 UTC m=+32.181676213" observedRunningTime="2024-07-02 08:23:10.292253113 +0000 UTC m=+33.251093103" watchObservedRunningTime="2024-07-02 08:23:10.292449757 +0000 UTC m=+33.251289725" Jul 2 08:23:11.265000 audit[3872]: AVC avc: denied { write } for pid=3872 comm="tee" name="fd" dev="proc" ino=41099 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:23:11.265000 audit[3872]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc15652a10 a2=241 a3=1b6 items=1 ppid=3842 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:11.265000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 08:23:11.265000 audit: PATH item=0 name="/dev/fd/63" inode=38183 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:23:11.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:23:11.265000 audit[3884]: AVC avc: denied { write } for pid=3884 comm="tee" name="fd" dev="proc" ino=16136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:23:11.265000 audit[3884]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe84baba10 a2=241 a3=1b6 items=1 ppid=3847 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:11.265000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 08:23:11.265000 audit: PATH item=0 name="/dev/fd/63" inode=16133 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:23:11.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:23:11.265000 audit[3880]: AVC avc: denied { write } for pid=3880 comm="tee" name="fd" dev="proc" ino=37185 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:23:11.265000 audit[3879]: AVC avc: denied { write } for pid=3879 comm="tee" name="fd" dev="proc" ino=30389 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:23:11.265000 audit[3880]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdaf19ca00 a2=241 a3=1b6 items=1 ppid=3845 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:11.265000 audit[3879]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4e37ba11 a2=241 a3=1b6 items=1 ppid=3841 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:11.265000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 08:23:11.265000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 08:23:11.265000 audit: PATH item=0 name="/dev/fd/63" inode=37182 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:23:11.265000 audit: PATH item=0 name="/dev/fd/63" inode=40174 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:23:11.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:23:11.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:23:11.265000 audit[3886]: AVC avc: denied { write } for pid=3886 comm="tee" name="fd" dev="proc" ino=35184 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:23:11.265000 audit[3886]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1922ca01 a2=241 a3=1b6 items=1 ppid=3844 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:11.265000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 08:23:11.265000 audit: PATH item=0 name="/dev/fd/63" inode=35181 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:23:11.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:23:11.266000 audit[3885]: AVC avc: denied { write } for pid=3885 comm="tee" name="fd" dev="proc" ino=8909 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:23:11.266000 audit[3885]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe17079a10 a2=241 a3=1b6 items=1 ppid=3843 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:11.266000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 08:23:11.266000 audit: PATH item=0 name="/dev/fd/63" inode=39250 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:23:11.266000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:23:11.266000 audit[3887]: AVC avc: denied { write } for pid=3887 comm="tee" name="fd" dev="proc" ino=41103 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:23:11.266000 audit[3887]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd15daca12 a2=241 a3=1b6 items=1 ppid=3840 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:11.266000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 08:23:11.266000 audit: PATH item=0 name="/dev/fd/63" inode=38184 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:23:11.266000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:23:17.098452 env[1571]: time="2024-07-02T08:23:17.098428193Z" level=info msg="StopPodSandbox for \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\"" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.122 [INFO][4191] k8s.go 608: Cleaning up netns ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.122 [INFO][4191] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" iface="eth0" netns="/var/run/netns/cni-a2ecefe0-aed5-8a03-c816-fd7574be779a" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.122 [INFO][4191] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" iface="eth0" netns="/var/run/netns/cni-a2ecefe0-aed5-8a03-c816-fd7574be779a" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.122 [INFO][4191] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" iface="eth0" netns="/var/run/netns/cni-a2ecefe0-aed5-8a03-c816-fd7574be779a" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.122 [INFO][4191] k8s.go 615: Releasing IP address(es) ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.122 [INFO][4191] utils.go 188: Calico CNI releasing IP address ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.134 [INFO][4207] ipam_plugin.go 411: Releasing address using handleID ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.134 [INFO][4207] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.134 [INFO][4207] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.138 [WARNING][4207] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.138 [INFO][4207] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.139 [INFO][4207] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:17.141253 env[1571]: 2024-07-02 08:23:17.140 [INFO][4191] k8s.go 621: Teardown processing complete. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:17.141637 env[1571]: time="2024-07-02T08:23:17.141364369Z" level=info msg="TearDown network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\" successfully" Jul 2 08:23:17.141637 env[1571]: time="2024-07-02T08:23:17.141386785Z" level=info msg="StopPodSandbox for \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\" returns successfully" Jul 2 08:23:17.141803 env[1571]: time="2024-07-02T08:23:17.141791049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-gfsgs,Uid:ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f,Namespace:kube-system,Attempt:1,}" Jul 2 08:23:17.142914 systemd[1]: run-netns-cni\x2da2ecefe0\x2daed5\x2d8a03\x2dc816\x2dfd7574be779a.mount: Deactivated successfully. Jul 2 08:23:17.204470 systemd-networkd[1315]: cali043f8bcd82b: Link UP Jul 2 08:23:17.260467 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:23:17.260513 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali043f8bcd82b: link becomes ready Jul 2 08:23:17.260512 systemd-networkd[1315]: cali043f8bcd82b: Gained carrier Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.155 [INFO][4226] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.162 [INFO][4226] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0 coredns-7db6d8ff4d- kube-system ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f 665 0 2024-07-02 08:22:50 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-12d7dcb878 coredns-7db6d8ff4d-gfsgs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali043f8bcd82b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Namespace="kube-system" Pod="coredns-7db6d8ff4d-gfsgs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.162 [INFO][4226] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Namespace="kube-system" Pod="coredns-7db6d8ff4d-gfsgs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.176 [INFO][4247] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" HandleID="k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.182 [INFO][4247] ipam_plugin.go 264: Auto assigning IP ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" HandleID="k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00034f120), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-12d7dcb878", "pod":"coredns-7db6d8ff4d-gfsgs", "timestamp":"2024-07-02 08:23:17.176209157 +0000 UTC"}, Hostname:"ci-3510.3.5-a-12d7dcb878", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.182 [INFO][4247] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.182 [INFO][4247] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.182 [INFO][4247] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-12d7dcb878' Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.183 [INFO][4247] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.185 [INFO][4247] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.188 [INFO][4247] ipam.go 489: Trying affinity for 192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.189 [INFO][4247] ipam.go 155: Attempting to load block cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.191 [INFO][4247] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.191 [INFO][4247] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.0/26 handle="k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.192 [INFO][4247] ipam.go 1685: Creating new handle: k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.194 [INFO][4247] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.0/26 handle="k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.197 [INFO][4247] ipam.go 1216: Successfully claimed IPs: [192.168.4.1/26] block=192.168.4.0/26 handle="k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.197 [INFO][4247] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.1/26] handle="k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.197 [INFO][4247] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:17.266051 env[1571]: 2024-07-02 08:23:17.197 [INFO][4247] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.4.1/26] IPv6=[] ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" HandleID="k8s-pod-network.969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.266491 env[1571]: 2024-07-02 08:23:17.199 [INFO][4226] k8s.go 386: Populated endpoint ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Namespace="kube-system" Pod="coredns-7db6d8ff4d-gfsgs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f", ResourceVersion:"665", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"", Pod:"coredns-7db6d8ff4d-gfsgs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali043f8bcd82b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:17.266491 env[1571]: 2024-07-02 08:23:17.199 [INFO][4226] k8s.go 387: Calico CNI using IPs: [192.168.4.1/32] ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Namespace="kube-system" Pod="coredns-7db6d8ff4d-gfsgs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.266491 env[1571]: 2024-07-02 08:23:17.199 [INFO][4226] dataplane_linux.go 68: Setting the host side veth name to cali043f8bcd82b ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Namespace="kube-system" Pod="coredns-7db6d8ff4d-gfsgs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.266491 env[1571]: 2024-07-02 08:23:17.260 [INFO][4226] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Namespace="kube-system" Pod="coredns-7db6d8ff4d-gfsgs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.266491 env[1571]: 2024-07-02 08:23:17.260 [INFO][4226] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Namespace="kube-system" Pod="coredns-7db6d8ff4d-gfsgs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f", ResourceVersion:"665", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc", Pod:"coredns-7db6d8ff4d-gfsgs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali043f8bcd82b", MAC:"e2:07:ea:4b:d9:fd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:17.266491 env[1571]: 2024-07-02 08:23:17.265 [INFO][4226] k8s.go 500: Wrote updated endpoint to datastore ContainerID="969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc" Namespace="kube-system" Pod="coredns-7db6d8ff4d-gfsgs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:17.271639 env[1571]: time="2024-07-02T08:23:17.271574354Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:23:17.271639 env[1571]: time="2024-07-02T08:23:17.271595085Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:23:17.271639 env[1571]: time="2024-07-02T08:23:17.271601836Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:23:17.271765 env[1571]: time="2024-07-02T08:23:17.271711747Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc pid=4286 runtime=io.containerd.runc.v2 Jul 2 08:23:17.278541 systemd[1]: Started cri-containerd-969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc.scope. Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.308998 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 2 08:23:17.309038 kernel: audit: type=1400 audit(1719908597.281:993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.432994 kernel: audit: type=1400 audit(1719908597.281:994): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.433060 kernel: audit: type=1400 audit(1719908597.281:995): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.433078 kernel: audit: type=1400 audit(1719908597.281:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.433094 kernel: audit: type=1400 audit(1719908597.281:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.620635 kernel: audit: type=1400 audit(1719908597.281:998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.682560 kernel: audit: type=1400 audit(1719908597.281:999): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.745564 kernel: audit: type=1400 audit(1719908597.281:1000): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.869853 kernel: audit: type=1400 audit(1719908597.281:1001): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.869880 kernel: audit: type=1400 audit(1719908597.431:1002): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit: BPF prog-id=136 op=LOAD Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4286 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396664303964653932326236303535653737633863333062383439 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4286 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396664303964653932326236303535653737633863333062383439 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.431000 audit: BPF prog-id=137 op=LOAD Jul 2 08:23:17.431000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003be490 items=0 ppid=4286 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396664303964653932326236303535653737633863333062383439 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.556000 audit: BPF prog-id=138 op=LOAD Jul 2 08:23:17.556000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003be4d8 items=0 ppid=4286 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396664303964653932326236303535653737633863333062383439 Jul 2 08:23:17.680000 audit: BPF prog-id=138 op=UNLOAD Jul 2 08:23:17.680000 audit: BPF prog-id=137 op=UNLOAD Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.680000 audit: BPF prog-id=139 op=LOAD Jul 2 08:23:17.680000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be8e8 items=0 ppid=4286 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396664303964653932326236303535653737633863333062383439 Jul 2 08:23:17.948411 env[1571]: time="2024-07-02T08:23:17.948382264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-gfsgs,Uid:ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f,Namespace:kube-system,Attempt:1,} returns sandbox id \"969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc\"" Jul 2 08:23:17.949573 env[1571]: time="2024-07-02T08:23:17.949551683Z" level=info msg="CreateContainer within sandbox \"969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 08:23:17.954005 env[1571]: time="2024-07-02T08:23:17.953961988Z" level=info msg="CreateContainer within sandbox \"969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"42d4161cfee7d925bfdad536a10919176dff9bca0643c75e35396ecc47d323f5\"" Jul 2 08:23:17.954123 env[1571]: time="2024-07-02T08:23:17.954109345Z" level=info msg="StartContainer for \"42d4161cfee7d925bfdad536a10919176dff9bca0643c75e35396ecc47d323f5\"" Jul 2 08:23:17.961398 systemd[1]: Started cri-containerd-42d4161cfee7d925bfdad536a10919176dff9bca0643c75e35396ecc47d323f5.scope. Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit: BPF prog-id=140 op=LOAD Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4286 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643431363163666565376439323562666461643533366131303931 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4286 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643431363163666565376439323562666461643533366131303931 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.966000 audit: BPF prog-id=141 op=LOAD Jul 2 08:23:17.966000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a1a10 items=0 ppid=4286 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643431363163666565376439323562666461643533366131303931 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit: BPF prog-id=142 op=LOAD Jul 2 08:23:17.967000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1a58 items=0 ppid=4286 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643431363163666565376439323562666461643533366131303931 Jul 2 08:23:17.967000 audit: BPF prog-id=142 op=UNLOAD Jul 2 08:23:17.967000 audit: BPF prog-id=141 op=UNLOAD Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:17.967000 audit: BPF prog-id=143 op=LOAD Jul 2 08:23:17.967000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1e68 items=0 ppid=4286 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:17.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643431363163666565376439323562666461643533366131303931 Jul 2 08:23:17.973967 env[1571]: time="2024-07-02T08:23:17.973939995Z" level=info msg="StartContainer for \"42d4161cfee7d925bfdad536a10919176dff9bca0643c75e35396ecc47d323f5\" returns successfully" Jul 2 08:23:18.099284 env[1571]: time="2024-07-02T08:23:18.099203726Z" level=info msg="StopPodSandbox for \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\"" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.135 [INFO][4410] k8s.go 608: Cleaning up netns ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.135 [INFO][4410] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" iface="eth0" netns="/var/run/netns/cni-f249927b-bfd7-1bb8-d0a1-57548205f175" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.135 [INFO][4410] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" iface="eth0" netns="/var/run/netns/cni-f249927b-bfd7-1bb8-d0a1-57548205f175" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.136 [INFO][4410] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" iface="eth0" netns="/var/run/netns/cni-f249927b-bfd7-1bb8-d0a1-57548205f175" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.136 [INFO][4410] k8s.go 615: Releasing IP address(es) ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.136 [INFO][4410] utils.go 188: Calico CNI releasing IP address ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.146 [INFO][4426] ipam_plugin.go 411: Releasing address using handleID ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.146 [INFO][4426] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.146 [INFO][4426] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.150 [WARNING][4426] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.150 [INFO][4426] ipam_plugin.go 439: Releasing address using workloadID ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.151 [INFO][4426] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:18.152982 env[1571]: 2024-07-02 08:23:18.152 [INFO][4410] k8s.go 621: Teardown processing complete. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:18.153316 env[1571]: time="2024-07-02T08:23:18.153028806Z" level=info msg="TearDown network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\" successfully" Jul 2 08:23:18.153316 env[1571]: time="2024-07-02T08:23:18.153048376Z" level=info msg="StopPodSandbox for \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\" returns successfully" Jul 2 08:23:18.153425 env[1571]: time="2024-07-02T08:23:18.153411197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b5946468f-wsv8p,Uid:0c293c6c-0ee4-43d7-a767-415ecbdd45dd,Namespace:calico-system,Attempt:1,}" Jul 2 08:23:18.154536 systemd[1]: run-netns-cni\x2df249927b\x2dbfd7\x2d1bb8\x2dd0a1\x2d57548205f175.mount: Deactivated successfully. Jul 2 08:23:18.216161 systemd-networkd[1315]: cali42586007edb: Link UP Jul 2 08:23:18.271218 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:23:18.271257 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali42586007edb: link becomes ready Jul 2 08:23:18.271374 systemd-networkd[1315]: cali42586007edb: Gained carrier Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.168 [INFO][4443] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.175 [INFO][4443] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0 calico-kube-controllers-b5946468f- calico-system 0c293c6c-0ee4-43d7-a767-415ecbdd45dd 676 0 2024-07-02 08:22:56 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:b5946468f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.5-a-12d7dcb878 calico-kube-controllers-b5946468f-wsv8p eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali42586007edb [] []}} ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Namespace="calico-system" Pod="calico-kube-controllers-b5946468f-wsv8p" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.175 [INFO][4443] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Namespace="calico-system" Pod="calico-kube-controllers-b5946468f-wsv8p" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.190 [INFO][4463] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" HandleID="k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.196 [INFO][4463] ipam_plugin.go 264: Auto assigning IP ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" HandleID="k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029ae10), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-12d7dcb878", "pod":"calico-kube-controllers-b5946468f-wsv8p", "timestamp":"2024-07-02 08:23:18.190350302 +0000 UTC"}, Hostname:"ci-3510.3.5-a-12d7dcb878", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.196 [INFO][4463] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.196 [INFO][4463] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.196 [INFO][4463] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-12d7dcb878' Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.198 [INFO][4463] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.200 [INFO][4463] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.204 [INFO][4463] ipam.go 489: Trying affinity for 192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.205 [INFO][4463] ipam.go 155: Attempting to load block cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.207 [INFO][4463] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.207 [INFO][4463] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.0/26 handle="k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.208 [INFO][4463] ipam.go 1685: Creating new handle: k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0 Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.211 [INFO][4463] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.0/26 handle="k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.214 [INFO][4463] ipam.go 1216: Successfully claimed IPs: [192.168.4.2/26] block=192.168.4.0/26 handle="k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.214 [INFO][4463] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.2/26] handle="k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.214 [INFO][4463] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:18.277327 env[1571]: 2024-07-02 08:23:18.214 [INFO][4463] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.4.2/26] IPv6=[] ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" HandleID="k8s-pod-network.fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.277811 env[1571]: 2024-07-02 08:23:18.215 [INFO][4443] k8s.go 386: Populated endpoint ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Namespace="calico-system" Pod="calico-kube-controllers-b5946468f-wsv8p" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0", GenerateName:"calico-kube-controllers-b5946468f-", Namespace:"calico-system", SelfLink:"", UID:"0c293c6c-0ee4-43d7-a767-415ecbdd45dd", ResourceVersion:"676", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b5946468f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"", Pod:"calico-kube-controllers-b5946468f-wsv8p", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali42586007edb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:18.277811 env[1571]: 2024-07-02 08:23:18.215 [INFO][4443] k8s.go 387: Calico CNI using IPs: [192.168.4.2/32] ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Namespace="calico-system" Pod="calico-kube-controllers-b5946468f-wsv8p" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.277811 env[1571]: 2024-07-02 08:23:18.215 [INFO][4443] dataplane_linux.go 68: Setting the host side veth name to cali42586007edb ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Namespace="calico-system" Pod="calico-kube-controllers-b5946468f-wsv8p" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.277811 env[1571]: 2024-07-02 08:23:18.271 [INFO][4443] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Namespace="calico-system" Pod="calico-kube-controllers-b5946468f-wsv8p" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.277811 env[1571]: 2024-07-02 08:23:18.271 [INFO][4443] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Namespace="calico-system" Pod="calico-kube-controllers-b5946468f-wsv8p" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0", GenerateName:"calico-kube-controllers-b5946468f-", Namespace:"calico-system", SelfLink:"", UID:"0c293c6c-0ee4-43d7-a767-415ecbdd45dd", ResourceVersion:"676", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b5946468f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0", Pod:"calico-kube-controllers-b5946468f-wsv8p", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali42586007edb", MAC:"ba:35:e8:66:25:d3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:18.277811 env[1571]: 2024-07-02 08:23:18.276 [INFO][4443] k8s.go 500: Wrote updated endpoint to datastore ContainerID="fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0" Namespace="calico-system" Pod="calico-kube-controllers-b5946468f-wsv8p" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:18.282979 env[1571]: time="2024-07-02T08:23:18.282911845Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:23:18.282979 env[1571]: time="2024-07-02T08:23:18.282932559Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:23:18.282979 env[1571]: time="2024-07-02T08:23:18.282939362Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:23:18.283086 env[1571]: time="2024-07-02T08:23:18.283002231Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0 pid=4500 runtime=io.containerd.runc.v2 Jul 2 08:23:18.288577 systemd[1]: Started cri-containerd-fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0.scope. Jul 2 08:23:18.295958 kubelet[2607]: I0702 08:23:18.295921 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-gfsgs" podStartSLOduration=28.295907011 podStartE2EDuration="28.295907011s" podCreationTimestamp="2024-07-02 08:22:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 08:23:18.295766455 +0000 UTC m=+41.254606366" watchObservedRunningTime="2024-07-02 08:23:18.295907011 +0000 UTC m=+41.254746919" Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit: BPF prog-id=144 op=LOAD Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4500 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616666393734666633356461373536373537363632646163313861 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4500 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616666393734666633356461373536373537363632646163313861 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit: BPF prog-id=145 op=LOAD Jul 2 08:23:18.294000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025bb0 items=0 ppid=4500 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616666393734666633356461373536373537363632646163313861 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.294000 audit: BPF prog-id=146 op=LOAD Jul 2 08:23:18.294000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025bf8 items=0 ppid=4500 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616666393734666633356461373536373537363632646163313861 Jul 2 08:23:18.294000 audit: BPF prog-id=146 op=UNLOAD Jul 2 08:23:18.294000 audit: BPF prog-id=145 op=UNLOAD Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:18.295000 audit: BPF prog-id=147 op=LOAD Jul 2 08:23:18.295000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e6008 items=0 ppid=4500 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616666393734666633356461373536373537363632646163313861 Jul 2 08:23:18.299000 audit[4529]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=4529 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:18.299000 audit[4529]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe9fd64a80 a2=0 a3=7ffe9fd64a6c items=0 ppid=2865 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:18.299000 audit[4529]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=4529 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:18.299000 audit[4529]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe9fd64a80 a2=0 a3=0 items=0 ppid=2865 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:18.312771 env[1571]: time="2024-07-02T08:23:18.312746514Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b5946468f-wsv8p,Uid:0c293c6c-0ee4-43d7-a767-415ecbdd45dd,Namespace:calico-system,Attempt:1,} returns sandbox id \"fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0\"" Jul 2 08:23:18.313470 env[1571]: time="2024-07-02T08:23:18.313457820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 08:23:18.326000 audit[4539]: NETFILTER_CFG table=filter:95 family=2 entries=13 op=nft_register_rule pid=4539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:18.326000 audit[4539]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe89c08f40 a2=0 a3=7ffe89c08f2c items=0 ppid=2865 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:18.337000 audit[4539]: NETFILTER_CFG table=nat:96 family=2 entries=33 op=nft_register_chain pid=4539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:18.337000 audit[4539]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffe89c08f40 a2=0 a3=7ffe89c08f2c items=0 ppid=2865 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:18.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:19.037915 systemd-networkd[1315]: cali043f8bcd82b: Gained IPv6LL Jul 2 08:23:19.099630 env[1571]: time="2024-07-02T08:23:19.099528420Z" level=info msg="StopPodSandbox for \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\"" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.137 [INFO][4594] k8s.go 608: Cleaning up netns ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.137 [INFO][4594] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" iface="eth0" netns="/var/run/netns/cni-f195f686-ad47-6824-af0f-3185966e1da0" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.137 [INFO][4594] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" iface="eth0" netns="/var/run/netns/cni-f195f686-ad47-6824-af0f-3185966e1da0" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.137 [INFO][4594] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" iface="eth0" netns="/var/run/netns/cni-f195f686-ad47-6824-af0f-3185966e1da0" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.137 [INFO][4594] k8s.go 615: Releasing IP address(es) ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.137 [INFO][4594] utils.go 188: Calico CNI releasing IP address ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.148 [INFO][4612] ipam_plugin.go 411: Releasing address using handleID ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.148 [INFO][4612] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.148 [INFO][4612] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.151 [WARNING][4612] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.151 [INFO][4612] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.152 [INFO][4612] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:19.154436 env[1571]: 2024-07-02 08:23:19.153 [INFO][4594] k8s.go 621: Teardown processing complete. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:19.155008 env[1571]: time="2024-07-02T08:23:19.154472298Z" level=info msg="TearDown network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\" successfully" Jul 2 08:23:19.155008 env[1571]: time="2024-07-02T08:23:19.154490985Z" level=info msg="StopPodSandbox for \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\" returns successfully" Jul 2 08:23:19.155008 env[1571]: time="2024-07-02T08:23:19.154974048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2cvcs,Uid:deaa368b-02e9-4638-9ae0-7c4d5931182e,Namespace:kube-system,Attempt:1,}" Jul 2 08:23:19.156393 systemd[1]: run-netns-cni\x2df195f686\x2dad47\x2d6824\x2daf0f\x2d3185966e1da0.mount: Deactivated successfully. Jul 2 08:23:19.218058 systemd-networkd[1315]: cali7abd276b09c: Link UP Jul 2 08:23:19.271899 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:23:19.271939 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7abd276b09c: link becomes ready Jul 2 08:23:19.271998 systemd-networkd[1315]: cali7abd276b09c: Gained carrier Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.170 [INFO][4628] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.176 [INFO][4628] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0 coredns-7db6d8ff4d- kube-system deaa368b-02e9-4638-9ae0-7c4d5931182e 691 0 2024-07-02 08:22:50 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-12d7dcb878 coredns-7db6d8ff4d-2cvcs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7abd276b09c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2cvcs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.176 [INFO][4628] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2cvcs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.191 [INFO][4648] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" HandleID="k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.196 [INFO][4648] ipam_plugin.go 264: Auto assigning IP ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" HandleID="k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000298360), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-12d7dcb878", "pod":"coredns-7db6d8ff4d-2cvcs", "timestamp":"2024-07-02 08:23:19.19146535 +0000 UTC"}, Hostname:"ci-3510.3.5-a-12d7dcb878", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.196 [INFO][4648] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.197 [INFO][4648] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.197 [INFO][4648] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-12d7dcb878' Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.198 [INFO][4648] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.202 [INFO][4648] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.205 [INFO][4648] ipam.go 489: Trying affinity for 192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.206 [INFO][4648] ipam.go 155: Attempting to load block cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.208 [INFO][4648] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.208 [INFO][4648] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.0/26 handle="k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.209 [INFO][4648] ipam.go 1685: Creating new handle: k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2 Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.212 [INFO][4648] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.0/26 handle="k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.215 [INFO][4648] ipam.go 1216: Successfully claimed IPs: [192.168.4.3/26] block=192.168.4.0/26 handle="k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.215 [INFO][4648] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.3/26] handle="k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.215 [INFO][4648] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:19.277619 env[1571]: 2024-07-02 08:23:19.215 [INFO][4648] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.4.3/26] IPv6=[] ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" HandleID="k8s-pod-network.53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.278088 env[1571]: 2024-07-02 08:23:19.216 [INFO][4628] k8s.go 386: Populated endpoint ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2cvcs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"deaa368b-02e9-4638-9ae0-7c4d5931182e", ResourceVersion:"691", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"", Pod:"coredns-7db6d8ff4d-2cvcs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7abd276b09c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:19.278088 env[1571]: 2024-07-02 08:23:19.217 [INFO][4628] k8s.go 387: Calico CNI using IPs: [192.168.4.3/32] ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2cvcs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.278088 env[1571]: 2024-07-02 08:23:19.217 [INFO][4628] dataplane_linux.go 68: Setting the host side veth name to cali7abd276b09c ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2cvcs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.278088 env[1571]: 2024-07-02 08:23:19.271 [INFO][4628] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2cvcs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.278088 env[1571]: 2024-07-02 08:23:19.272 [INFO][4628] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2cvcs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"deaa368b-02e9-4638-9ae0-7c4d5931182e", ResourceVersion:"691", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2", Pod:"coredns-7db6d8ff4d-2cvcs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7abd276b09c", MAC:"f2:02:e1:4b:d2:f0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:19.278088 env[1571]: 2024-07-02 08:23:19.276 [INFO][4628] k8s.go 500: Wrote updated endpoint to datastore ContainerID="53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2cvcs" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:19.284104 env[1571]: time="2024-07-02T08:23:19.284042831Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:23:19.284104 env[1571]: time="2024-07-02T08:23:19.284063766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:23:19.284104 env[1571]: time="2024-07-02T08:23:19.284070566Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:23:19.284225 env[1571]: time="2024-07-02T08:23:19.284142504Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2 pid=4684 runtime=io.containerd.runc.v2 Jul 2 08:23:19.289603 systemd[1]: Started cri-containerd-53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2.scope. Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.295000 audit: BPF prog-id=148 op=LOAD Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4684 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373333616137613238373663373836353632323135303561383263 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4684 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373333616137613238373663373836353632323135303561383263 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit: BPF prog-id=149 op=LOAD Jul 2 08:23:19.296000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000275d90 items=0 ppid=4684 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373333616137613238373663373836353632323135303561383263 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit: BPF prog-id=150 op=LOAD Jul 2 08:23:19.296000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000275dd8 items=0 ppid=4684 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373333616137613238373663373836353632323135303561383263 Jul 2 08:23:19.296000 audit: BPF prog-id=150 op=UNLOAD Jul 2 08:23:19.296000 audit: BPF prog-id=149 op=UNLOAD Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.296000 audit: BPF prog-id=151 op=LOAD Jul 2 08:23:19.296000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ea1e8 items=0 ppid=4684 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373333616137613238373663373836353632323135303561383263 Jul 2 08:23:19.312835 env[1571]: time="2024-07-02T08:23:19.312808882Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2cvcs,Uid:deaa368b-02e9-4638-9ae0-7c4d5931182e,Namespace:kube-system,Attempt:1,} returns sandbox id \"53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2\"" Jul 2 08:23:19.313991 env[1571]: time="2024-07-02T08:23:19.313978043Z" level=info msg="CreateContainer within sandbox \"53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 08:23:19.318367 env[1571]: time="2024-07-02T08:23:19.318326800Z" level=info msg="CreateContainer within sandbox \"53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"483e20df5f4d133608b7e216aa1ddb84af611d2abe80a28362b003e14c0d671f\"" Jul 2 08:23:19.318564 env[1571]: time="2024-07-02T08:23:19.318546963Z" level=info msg="StartContainer for \"483e20df5f4d133608b7e216aa1ddb84af611d2abe80a28362b003e14c0d671f\"" Jul 2 08:23:19.325666 systemd[1]: Started cri-containerd-483e20df5f4d133608b7e216aa1ddb84af611d2abe80a28362b003e14c0d671f.scope. Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit: BPF prog-id=152 op=LOAD Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4684 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438336532306466356634643133333630386237653231366161316464 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4684 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438336532306466356634643133333630386237653231366161316464 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit: BPF prog-id=153 op=LOAD Jul 2 08:23:19.331000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d4a40 items=0 ppid=4684 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438336532306466356634643133333630386237653231366161316464 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.331000 audit: BPF prog-id=154 op=LOAD Jul 2 08:23:19.331000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d4a88 items=0 ppid=4684 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438336532306466356634643133333630386237653231366161316464 Jul 2 08:23:19.332000 audit: BPF prog-id=154 op=UNLOAD Jul 2 08:23:19.332000 audit: BPF prog-id=153 op=UNLOAD Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:19.332000 audit: BPF prog-id=155 op=LOAD Jul 2 08:23:19.332000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d4e98 items=0 ppid=4684 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:19.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438336532306466356634643133333630386237653231366161316464 Jul 2 08:23:19.337639 env[1571]: time="2024-07-02T08:23:19.337615045Z" level=info msg="StartContainer for \"483e20df5f4d133608b7e216aa1ddb84af611d2abe80a28362b003e14c0d671f\" returns successfully" Jul 2 08:23:20.098442 env[1571]: time="2024-07-02T08:23:20.098376967Z" level=info msg="StopPodSandbox for \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\"" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.121 [INFO][4818] k8s.go 608: Cleaning up netns ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.121 [INFO][4818] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" iface="eth0" netns="/var/run/netns/cni-bb5b423f-e653-ed25-f9f6-21c347311d61" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.121 [INFO][4818] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" iface="eth0" netns="/var/run/netns/cni-bb5b423f-e653-ed25-f9f6-21c347311d61" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.121 [INFO][4818] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" iface="eth0" netns="/var/run/netns/cni-bb5b423f-e653-ed25-f9f6-21c347311d61" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.121 [INFO][4818] k8s.go 615: Releasing IP address(es) ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.121 [INFO][4818] utils.go 188: Calico CNI releasing IP address ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.132 [INFO][4833] ipam_plugin.go 411: Releasing address using handleID ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.132 [INFO][4833] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.132 [INFO][4833] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.136 [WARNING][4833] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.136 [INFO][4833] ipam_plugin.go 439: Releasing address using workloadID ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.138 [INFO][4833] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:20.139299 env[1571]: 2024-07-02 08:23:20.138 [INFO][4818] k8s.go 621: Teardown processing complete. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:20.139861 env[1571]: time="2024-07-02T08:23:20.139380797Z" level=info msg="TearDown network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\" successfully" Jul 2 08:23:20.139861 env[1571]: time="2024-07-02T08:23:20.139416900Z" level=info msg="StopPodSandbox for \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\" returns successfully" Jul 2 08:23:20.140007 env[1571]: time="2024-07-02T08:23:20.139963801Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p2f4l,Uid:85a5a732-761c-425d-b1b7-35c0263f2e7e,Namespace:calico-system,Attempt:1,}" Jul 2 08:23:20.143722 systemd[1]: run-netns-cni\x2dbb5b423f\x2de653\x2ded25\x2df9f6\x2d21c347311d61.mount: Deactivated successfully. Jul 2 08:23:20.202804 systemd-networkd[1315]: calie3dd6d0a7c6: Link UP Jul 2 08:23:20.211964 env[1571]: time="2024-07-02T08:23:20.211936991Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:20.212676 env[1571]: time="2024-07-02T08:23:20.212653298Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:20.213403 env[1571]: time="2024-07-02T08:23:20.213382482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:20.214138 env[1571]: time="2024-07-02T08:23:20.214115399Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:20.214805 env[1571]: time="2024-07-02T08:23:20.214781623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 08:23:20.218425 env[1571]: time="2024-07-02T08:23:20.218397636Z" level=info msg="CreateContainer within sandbox \"fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 08:23:20.229954 systemd-networkd[1315]: calie3dd6d0a7c6: Gained carrier Jul 2 08:23:20.230569 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie3dd6d0a7c6: link becomes ready Jul 2 08:23:20.231238 env[1571]: time="2024-07-02T08:23:20.231217643Z" level=info msg="CreateContainer within sandbox \"fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"70bcfe3cf728696545f40d290e31b92a2b7fac5d53a540cd5d09f5908eed03b0\"" Jul 2 08:23:20.231488 env[1571]: time="2024-07-02T08:23:20.231474998Z" level=info msg="StartContainer for \"70bcfe3cf728696545f40d290e31b92a2b7fac5d53a540cd5d09f5908eed03b0\"" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.154 [INFO][4849] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.162 [INFO][4849] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0 csi-node-driver- calico-system 85a5a732-761c-425d-b1b7-35c0263f2e7e 701 0 2024-07-02 08:22:56 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.5-a-12d7dcb878 csi-node-driver-p2f4l eth0 default [] [] [kns.calico-system ksa.calico-system.default] calie3dd6d0a7c6 [] []}} ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Namespace="calico-system" Pod="csi-node-driver-p2f4l" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.162 [INFO][4849] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Namespace="calico-system" Pod="csi-node-driver-p2f4l" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.177 [INFO][4873] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" HandleID="k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.183 [INFO][4873] ipam_plugin.go 264: Auto assigning IP ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" HandleID="k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000336f00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-12d7dcb878", "pod":"csi-node-driver-p2f4l", "timestamp":"2024-07-02 08:23:20.177704161 +0000 UTC"}, Hostname:"ci-3510.3.5-a-12d7dcb878", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.183 [INFO][4873] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.183 [INFO][4873] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.183 [INFO][4873] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-12d7dcb878' Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.184 [INFO][4873] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.187 [INFO][4873] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.190 [INFO][4873] ipam.go 489: Trying affinity for 192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.192 [INFO][4873] ipam.go 155: Attempting to load block cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.194 [INFO][4873] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.194 [INFO][4873] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.0/26 handle="k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.195 [INFO][4873] ipam.go 1685: Creating new handle: k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6 Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.197 [INFO][4873] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.0/26 handle="k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.200 [INFO][4873] ipam.go 1216: Successfully claimed IPs: [192.168.4.4/26] block=192.168.4.0/26 handle="k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.200 [INFO][4873] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.4/26] handle="k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.200 [INFO][4873] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:20.235307 env[1571]: 2024-07-02 08:23:20.200 [INFO][4873] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.4.4/26] IPv6=[] ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" HandleID="k8s-pod-network.a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.235774 env[1571]: 2024-07-02 08:23:20.201 [INFO][4849] k8s.go 386: Populated endpoint ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Namespace="calico-system" Pod="csi-node-driver-p2f4l" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"85a5a732-761c-425d-b1b7-35c0263f2e7e", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"", Pod:"csi-node-driver-p2f4l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie3dd6d0a7c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:20.235774 env[1571]: 2024-07-02 08:23:20.201 [INFO][4849] k8s.go 387: Calico CNI using IPs: [192.168.4.4/32] ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Namespace="calico-system" Pod="csi-node-driver-p2f4l" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.235774 env[1571]: 2024-07-02 08:23:20.201 [INFO][4849] dataplane_linux.go 68: Setting the host side veth name to calie3dd6d0a7c6 ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Namespace="calico-system" Pod="csi-node-driver-p2f4l" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.235774 env[1571]: 2024-07-02 08:23:20.229 [INFO][4849] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Namespace="calico-system" Pod="csi-node-driver-p2f4l" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.235774 env[1571]: 2024-07-02 08:23:20.230 [INFO][4849] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Namespace="calico-system" Pod="csi-node-driver-p2f4l" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"85a5a732-761c-425d-b1b7-35c0263f2e7e", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6", Pod:"csi-node-driver-p2f4l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie3dd6d0a7c6", MAC:"da:17:2e:de:44:a3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:20.235774 env[1571]: 2024-07-02 08:23:20.234 [INFO][4849] k8s.go 500: Wrote updated endpoint to datastore ContainerID="a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6" Namespace="calico-system" Pod="csi-node-driver-p2f4l" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:20.239261 systemd[1]: Started cri-containerd-70bcfe3cf728696545f40d290e31b92a2b7fac5d53a540cd5d09f5908eed03b0.scope. Jul 2 08:23:20.240915 env[1571]: time="2024-07-02T08:23:20.240864959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:23:20.240915 env[1571]: time="2024-07-02T08:23:20.240888666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:23:20.240915 env[1571]: time="2024-07-02T08:23:20.240895492Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:23:20.241028 env[1571]: time="2024-07-02T08:23:20.240963796Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6 pid=4928 runtime=io.containerd.runc.v2 Jul 2 08:23:20.246210 systemd[1]: Started cri-containerd-a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6.scope. Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit: BPF prog-id=156 op=LOAD Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4500 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626366653363663732383639363534356634306432393065333162 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4500 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626366653363663732383639363534356634306432393065333162 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.246000 audit: BPF prog-id=157 op=LOAD Jul 2 08:23:20.246000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c25b0 items=0 ppid=4500 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626366653363663732383639363534356634306432393065333162 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit: BPF prog-id=158 op=LOAD Jul 2 08:23:20.247000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c25f8 items=0 ppid=4500 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626366653363663732383639363534356634306432393065333162 Jul 2 08:23:20.247000 audit: BPF prog-id=158 op=UNLOAD Jul 2 08:23:20.247000 audit: BPF prog-id=157 op=UNLOAD Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.247000 audit: BPF prog-id=159 op=LOAD Jul 2 08:23:20.247000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c2a08 items=0 ppid=4500 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626366653363663732383639363534356634306432393065333162 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit: BPF prog-id=160 op=LOAD Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4928 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323234616630346266313564323232383063643962643238373730 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4928 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323234616630346266313564323232383063643962643238373730 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit: BPF prog-id=161 op=LOAD Jul 2 08:23:20.251000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218930 items=0 ppid=4928 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323234616630346266313564323232383063643962643238373730 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.251000 audit: BPF prog-id=162 op=LOAD Jul 2 08:23:20.251000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218978 items=0 ppid=4928 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323234616630346266313564323232383063643962643238373730 Jul 2 08:23:20.251000 audit: BPF prog-id=162 op=UNLOAD Jul 2 08:23:20.252000 audit: BPF prog-id=161 op=UNLOAD Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:20.252000 audit: BPF prog-id=163 op=LOAD Jul 2 08:23:20.252000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218d88 items=0 ppid=4928 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323234616630346266313564323232383063643962643238373730 Jul 2 08:23:20.257031 env[1571]: time="2024-07-02T08:23:20.257005136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p2f4l,Uid:85a5a732-761c-425d-b1b7-35c0263f2e7e,Namespace:calico-system,Attempt:1,} returns sandbox id \"a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6\"" Jul 2 08:23:20.257721 env[1571]: time="2024-07-02T08:23:20.257708022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 08:23:20.264404 env[1571]: time="2024-07-02T08:23:20.264375914Z" level=info msg="StartContainer for \"70bcfe3cf728696545f40d290e31b92a2b7fac5d53a540cd5d09f5908eed03b0\" returns successfully" Jul 2 08:23:20.304898 kubelet[2607]: I0702 08:23:20.304855 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-b5946468f-wsv8p" podStartSLOduration=22.403053829 podStartE2EDuration="24.304839561s" podCreationTimestamp="2024-07-02 08:22:56 +0000 UTC" firstStartedPulling="2024-07-02 08:23:18.313338025 +0000 UTC m=+41.272177932" lastFinishedPulling="2024-07-02 08:23:20.215123755 +0000 UTC m=+43.173963664" observedRunningTime="2024-07-02 08:23:20.304753601 +0000 UTC m=+43.263593511" watchObservedRunningTime="2024-07-02 08:23:20.304839561 +0000 UTC m=+43.263679467" Jul 2 08:23:20.310800 kubelet[2607]: I0702 08:23:20.310764 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-2cvcs" podStartSLOduration=30.310751324 podStartE2EDuration="30.310751324s" podCreationTimestamp="2024-07-02 08:22:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 08:23:20.310505507 +0000 UTC m=+43.269345421" watchObservedRunningTime="2024-07-02 08:23:20.310751324 +0000 UTC m=+43.269591228" Jul 2 08:23:20.314000 audit[4992]: NETFILTER_CFG table=filter:97 family=2 entries=10 op=nft_register_rule pid=4992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:20.314000 audit[4992]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff76f35ef0 a2=0 a3=7fff76f35edc items=0 ppid=2865 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:20.318646 systemd-networkd[1315]: cali42586007edb: Gained IPv6LL Jul 2 08:23:20.315000 audit[4992]: NETFILTER_CFG table=nat:98 family=2 entries=42 op=nft_register_rule pid=4992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:20.315000 audit[4992]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7fff76f35ef0 a2=0 a3=7fff76f35edc items=0 ppid=2865 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:20.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:20.573647 systemd-networkd[1315]: cali7abd276b09c: Gained IPv6LL Jul 2 08:23:21.298594 kubelet[2607]: I0702 08:23:21.298510 2607 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 08:23:21.338000 audit[5030]: NETFILTER_CFG table=filter:99 family=2 entries=10 op=nft_register_rule pid=5030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:21.338000 audit[5030]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffec627f500 a2=0 a3=7ffec627f4ec items=0 ppid=2865 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:21.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:21.342818 systemd-networkd[1315]: calie3dd6d0a7c6: Gained IPv6LL Jul 2 08:23:21.355000 audit[5030]: NETFILTER_CFG table=nat:100 family=2 entries=54 op=nft_register_chain pid=5030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:21.355000 audit[5030]: SYSCALL arch=c000003e syscall=46 success=yes exit=19092 a0=3 a1=7ffec627f500 a2=0 a3=7ffec627f4ec items=0 ppid=2865 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:21.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:21.522654 env[1571]: time="2024-07-02T08:23:21.522612682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:21.523455 env[1571]: time="2024-07-02T08:23:21.523443181Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:21.524133 env[1571]: time="2024-07-02T08:23:21.524092247Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:21.525192 env[1571]: time="2024-07-02T08:23:21.525165256Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:21.525492 env[1571]: time="2024-07-02T08:23:21.525461914Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 08:23:21.526716 env[1571]: time="2024-07-02T08:23:21.526699735Z" level=info msg="CreateContainer within sandbox \"a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 08:23:21.533096 env[1571]: time="2024-07-02T08:23:21.533051554Z" level=info msg="CreateContainer within sandbox \"a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"af8ece65cb1ee0fbe1caf4192d509ed2465565f3037e8a0c7c7a315306ea9f75\"" Jul 2 08:23:21.533414 env[1571]: time="2024-07-02T08:23:21.533400889Z" level=info msg="StartContainer for \"af8ece65cb1ee0fbe1caf4192d509ed2465565f3037e8a0c7c7a315306ea9f75\"" Jul 2 08:23:21.544131 systemd[1]: Started cri-containerd-af8ece65cb1ee0fbe1caf4192d509ed2465565f3037e8a0c7c7a315306ea9f75.scope. Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f3b9b7c14f8 items=0 ppid=4928 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:21.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386563653635636231656530666265316361663431393264353039 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit: BPF prog-id=164 op=LOAD Jul 2 08:23:21.550000 audit[5040]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000341ee8 items=0 ppid=4928 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:21.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386563653635636231656530666265316361663431393264353039 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit: BPF prog-id=165 op=LOAD Jul 2 08:23:21.550000 audit[5040]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000341f38 items=0 ppid=4928 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:21.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386563653635636231656530666265316361663431393264353039 Jul 2 08:23:21.550000 audit: BPF prog-id=165 op=UNLOAD Jul 2 08:23:21.550000 audit: BPF prog-id=164 op=UNLOAD Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { perfmon } for pid=5040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit[5040]: AVC avc: denied { bpf } for pid=5040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:21.550000 audit: BPF prog-id=166 op=LOAD Jul 2 08:23:21.550000 audit[5040]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000341fc8 items=0 ppid=4928 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:21.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386563653635636231656530666265316361663431393264353039 Jul 2 08:23:21.557163 env[1571]: time="2024-07-02T08:23:21.557139047Z" level=info msg="StartContainer for \"af8ece65cb1ee0fbe1caf4192d509ed2465565f3037e8a0c7c7a315306ea9f75\" returns successfully" Jul 2 08:23:21.557718 env[1571]: time="2024-07-02T08:23:21.557704689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 08:23:22.830619 env[1571]: time="2024-07-02T08:23:22.830562694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:22.831145 env[1571]: time="2024-07-02T08:23:22.831104105Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:22.831790 env[1571]: time="2024-07-02T08:23:22.831746475Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:22.832790 env[1571]: time="2024-07-02T08:23:22.832748709Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:22.832946 env[1571]: time="2024-07-02T08:23:22.832900203Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 08:23:22.834448 env[1571]: time="2024-07-02T08:23:22.834410958Z" level=info msg="CreateContainer within sandbox \"a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 08:23:22.839125 env[1571]: time="2024-07-02T08:23:22.839080670Z" level=info msg="CreateContainer within sandbox \"a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"559a90b976a924fbd6c7b1a6b98f3e4d4715f162b13bdd8d13a03e49c37280da\"" Jul 2 08:23:22.839456 env[1571]: time="2024-07-02T08:23:22.839440246Z" level=info msg="StartContainer for \"559a90b976a924fbd6c7b1a6b98f3e4d4715f162b13bdd8d13a03e49c37280da\"" Jul 2 08:23:22.851212 systemd[1]: Started cri-containerd-559a90b976a924fbd6c7b1a6b98f3e4d4715f162b13bdd8d13a03e49c37280da.scope. Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.883245 kernel: kauditd_printk_skb: 456 callbacks suppressed Jul 2 08:23:22.883369 kernel: audit: type=1400 audit(1719908602.857:1133): avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd8d858e898 items=0 ppid=4928 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:23.033602 kernel: audit: type=1300 audit(1719908602.857:1133): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd8d858e898 items=0 ppid=4928 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:23.033670 kernel: audit: type=1327 audit(1719908602.857:1133): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535396139306239373661393234666264366337623161366239386633 Jul 2 08:23:22.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535396139306239373661393234666264366337623161366239386633 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.120587 kernel: audit: type=1400 audit(1719908602.857:1134): avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.238907 kernel: audit: type=1400 audit(1719908602.857:1134): avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.238943 kernel: audit: type=1400 audit(1719908602.857:1134): avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.298156 kernel: audit: type=1400 audit(1719908602.857:1134): avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.303590 env[1571]: time="2024-07-02T08:23:23.303562784Z" level=info msg="StartContainer for \"559a90b976a924fbd6c7b1a6b98f3e4d4715f162b13bdd8d13a03e49c37280da\" returns successfully" Jul 2 08:23:23.311069 kubelet[2607]: I0702 08:23:23.311035 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-p2f4l" podStartSLOduration=24.735021915 podStartE2EDuration="27.311024241s" podCreationTimestamp="2024-07-02 08:22:56 +0000 UTC" firstStartedPulling="2024-07-02 08:23:20.257579985 +0000 UTC m=+43.216419893" lastFinishedPulling="2024-07-02 08:23:22.833582311 +0000 UTC m=+45.792422219" observedRunningTime="2024-07-02 08:23:23.310657011 +0000 UTC m=+46.269496921" watchObservedRunningTime="2024-07-02 08:23:23.311024241 +0000 UTC m=+46.269864146" Jul 2 08:23:23.357753 kernel: audit: type=1400 audit(1719908602.857:1134): avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.417721 kernel: audit: type=1400 audit(1719908602.857:1134): avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.478347 kernel: audit: type=1400 audit(1719908602.857:1134): avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.857000 audit: BPF prog-id=167 op=LOAD Jul 2 08:23:22.857000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e40a8 items=0 ppid=4928 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:22.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535396139306239373661393234666264366337623161366239386633 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:22.942000 audit: BPF prog-id=168 op=LOAD Jul 2 08:23:22.942000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e40f8 items=0 ppid=4928 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:22.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535396139306239373661393234666264366337623161366239386633 Jul 2 08:23:23.119000 audit: BPF prog-id=168 op=UNLOAD Jul 2 08:23:23.119000 audit: BPF prog-id=167 op=UNLOAD Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:23.119000 audit: BPF prog-id=169 op=LOAD Jul 2 08:23:23.119000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e4188 items=0 ppid=4928 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:23.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535396139306239373661393234666264366337623161366239386633 Jul 2 08:23:24.139427 kubelet[2607]: I0702 08:23:24.139336 2607 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 08:23:24.139427 kubelet[2607]: I0702 08:23:24.139397 2607 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 08:23:25.442265 kubelet[2607]: I0702 08:23:25.442148 2607 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 08:23:25.462000 audit[5288]: NETFILTER_CFG table=filter:101 family=2 entries=9 op=nft_register_rule pid=5288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:25.462000 audit[5288]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe1bb5d000 a2=0 a3=7ffe1bb5cfec items=0 ppid=2865 pid=5288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:25.462000 audit[5288]: NETFILTER_CFG table=nat:102 family=2 entries=25 op=nft_register_chain pid=5288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:25.462000 audit[5288]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffe1bb5d000 a2=0 a3=7ffe1bb5cfec items=0 ppid=2865 pid=5288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:25.758241 systemd-networkd[1315]: vxlan.calico: Link UP Jul 2 08:23:25.758251 systemd-networkd[1315]: vxlan.calico: Gained carrier Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit: BPF prog-id=170 op=LOAD Jul 2 08:23:25.761000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd755675d0 a2=70 a3=7fa928e94000 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.761000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.761000 audit: BPF prog-id=170 op=UNLOAD Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit: BPF prog-id=171 op=LOAD Jul 2 08:23:25.761000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd755675d0 a2=70 a3=6f items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.761000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.761000 audit: BPF prog-id=171 op=UNLOAD Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd75567580 a2=70 a3=7ffd755675d0 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.761000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit: BPF prog-id=172 op=LOAD Jul 2 08:23:25.761000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd75567560 a2=70 a3=7ffd755675d0 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.761000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.761000 audit: BPF prog-id=172 op=UNLOAD Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd75567640 a2=70 a3=0 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.761000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd75567630 a2=70 a3=0 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.761000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.761000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.761000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd755675a0 a2=70 a3=0 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.761000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd75567670 a2=70 a3=148e8b0 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.762000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd75567670 a2=70 a3=148b880 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.762000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { perfmon } for pid=5365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit[5365]: AVC avc: denied { bpf } for pid=5365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.762000 audit: BPF prog-id=173 op=LOAD Jul 2 08:23:25.762000 audit[5365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd75567590 a2=70 a3=0 items=0 ppid=5289 pid=5365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.762000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:23:25.764000 audit[5370]: AVC avc: denied { bpf } for pid=5370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.764000 audit[5370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff475c6e20 a2=70 a3=fff80800 items=0 ppid=5289 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 08:23:25.764000 audit[5370]: AVC avc: denied { bpf } for pid=5370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:25.764000 audit[5370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff475c6cf0 a2=70 a3=3 items=0 ppid=5289 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 08:23:25.774000 audit: BPF prog-id=173 op=UNLOAD Jul 2 08:23:25.813000 audit[5461]: NETFILTER_CFG table=mangle:103 family=2 entries=16 op=nft_register_chain pid=5461 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:23:25.813000 audit[5461]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff94f09bc0 a2=0 a3=7fff94f09bac items=0 ppid=5289 pid=5461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.813000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:23:25.816000 audit[5459]: NETFILTER_CFG table=raw:104 family=2 entries=19 op=nft_register_chain pid=5459 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:23:25.816000 audit[5459]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffd12808630 a2=0 a3=7ffd1280861c items=0 ppid=5289 pid=5459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.816000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:23:25.816000 audit[5460]: NETFILTER_CFG table=nat:105 family=2 entries=15 op=nft_register_chain pid=5460 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:23:25.816000 audit[5460]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd53320770 a2=0 a3=7ffd5332075c items=0 ppid=5289 pid=5460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.816000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:23:25.818000 audit[5464]: NETFILTER_CFG table=filter:106 family=2 entries=147 op=nft_register_chain pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:23:25.818000 audit[5464]: SYSCALL arch=c000003e syscall=46 success=yes exit=83712 a0=3 a1=7ffdc0781dc0 a2=0 a3=7ffdc0781dac items=0 ppid=5289 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:25.818000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:23:27.421848 systemd-networkd[1315]: vxlan.calico: Gained IPv6LL Jul 2 08:23:31.949452 kubelet[2607]: I0702 08:23:31.949340 2607 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 08:23:33.137000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.164182 kernel: kauditd_printk_skb: 128 callbacks suppressed Jul 2 08:23:33.164240 kernel: audit: type=1400 audit(1719908613.137:1161): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.137000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e3abe0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:33.368379 kernel: audit: type=1300 audit(1719908613.137:1161): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e3abe0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:33.368422 kernel: audit: type=1327 audit(1719908613.137:1161): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:33.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:33.457753 kernel: audit: type=1400 audit(1719908613.137:1162): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.137000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.545129 kernel: audit: type=1300 audit(1719908613.137:1162): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001454a50 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:33.137000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001454a50 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:33.660487 kernel: audit: type=1327 audit(1719908613.137:1162): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:33.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:33.750079 kernel: audit: type=1400 audit(1719908613.163:1163): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006952510 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:23:33.941908 kernel: audit: type=1300 audit(1719908613.163:1163): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006952510 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:23:33.941947 kernel: audit: type=1327 audit(1719908613.163:1163): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:23:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:23:34.035998 kernel: audit: type=1400 audit(1719908613.164:1164): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.164000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.164000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00a12be00 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:23:33.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:23:33.164000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.164000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0091eed20 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:23:33.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:23:33.164000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.164000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00fe8d740 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:23:33.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:23:33.164000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.164000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0091eed80 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:23:33.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:23:33.164000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:33.164000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00a247f20 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:23:33.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:23:35.924595 kubelet[2607]: I0702 08:23:35.924511 2607 topology_manager.go:215] "Topology Admit Handler" podUID="660de226-1ce2-4273-9087-36d61e86887f" podNamespace="calico-apiserver" podName="calico-apiserver-6576df4768-ghqfw" Jul 2 08:23:35.926000 audit[5583]: NETFILTER_CFG table=filter:107 family=2 entries=9 op=nft_register_rule pid=5583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:35.926000 audit[5583]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc39202e60 a2=0 a3=7ffc39202e4c items=0 ppid=2865 pid=5583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:35.926000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:35.929422 kubelet[2607]: I0702 08:23:35.929392 2607 topology_manager.go:215] "Topology Admit Handler" podUID="941dffed-cb61-404c-a29b-85d5563613ae" podNamespace="calico-apiserver" podName="calico-apiserver-6576df4768-429lk" Jul 2 08:23:35.932388 systemd[1]: Created slice kubepods-besteffort-pod660de226_1ce2_4273_9087_36d61e86887f.slice. Jul 2 08:23:35.935987 systemd[1]: Created slice kubepods-besteffort-pod941dffed_cb61_404c_a29b_85d5563613ae.slice. Jul 2 08:23:35.928000 audit[5583]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=5583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:35.928000 audit[5583]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc39202e60 a2=0 a3=7ffc39202e4c items=0 ppid=2865 pid=5583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:35.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:35.942000 audit[5585]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=5585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:35.942000 audit[5585]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcbecd1510 a2=0 a3=7ffcbecd14fc items=0 ppid=2865 pid=5585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:35.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:35.957000 audit[5585]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=5585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:35.957000 audit[5585]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcbecd1510 a2=0 a3=7ffcbecd14fc items=0 ppid=2865 pid=5585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:35.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:36.010098 kubelet[2607]: I0702 08:23:36.010029 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sptqj\" (UniqueName: \"kubernetes.io/projected/941dffed-cb61-404c-a29b-85d5563613ae-kube-api-access-sptqj\") pod \"calico-apiserver-6576df4768-429lk\" (UID: \"941dffed-cb61-404c-a29b-85d5563613ae\") " pod="calico-apiserver/calico-apiserver-6576df4768-429lk" Jul 2 08:23:36.010347 kubelet[2607]: I0702 08:23:36.010121 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/660de226-1ce2-4273-9087-36d61e86887f-calico-apiserver-certs\") pod \"calico-apiserver-6576df4768-ghqfw\" (UID: \"660de226-1ce2-4273-9087-36d61e86887f\") " pod="calico-apiserver/calico-apiserver-6576df4768-ghqfw" Jul 2 08:23:36.010347 kubelet[2607]: I0702 08:23:36.010175 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/941dffed-cb61-404c-a29b-85d5563613ae-calico-apiserver-certs\") pod \"calico-apiserver-6576df4768-429lk\" (UID: \"941dffed-cb61-404c-a29b-85d5563613ae\") " pod="calico-apiserver/calico-apiserver-6576df4768-429lk" Jul 2 08:23:36.010347 kubelet[2607]: I0702 08:23:36.010224 2607 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jdqg5\" (UniqueName: \"kubernetes.io/projected/660de226-1ce2-4273-9087-36d61e86887f-kube-api-access-jdqg5\") pod \"calico-apiserver-6576df4768-ghqfw\" (UID: \"660de226-1ce2-4273-9087-36d61e86887f\") " pod="calico-apiserver/calico-apiserver-6576df4768-ghqfw" Jul 2 08:23:36.111109 kubelet[2607]: E0702 08:23:36.111001 2607 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 08:23:36.111402 kubelet[2607]: E0702 08:23:36.111004 2607 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 08:23:36.111402 kubelet[2607]: E0702 08:23:36.111182 2607 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/660de226-1ce2-4273-9087-36d61e86887f-calico-apiserver-certs podName:660de226-1ce2-4273-9087-36d61e86887f nodeName:}" failed. No retries permitted until 2024-07-02 08:23:36.611137623 +0000 UTC m=+59.569977595 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/660de226-1ce2-4273-9087-36d61e86887f-calico-apiserver-certs") pod "calico-apiserver-6576df4768-ghqfw" (UID: "660de226-1ce2-4273-9087-36d61e86887f") : secret "calico-apiserver-certs" not found Jul 2 08:23:36.111402 kubelet[2607]: E0702 08:23:36.111347 2607 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/941dffed-cb61-404c-a29b-85d5563613ae-calico-apiserver-certs podName:941dffed-cb61-404c-a29b-85d5563613ae nodeName:}" failed. No retries permitted until 2024-07-02 08:23:36.611295926 +0000 UTC m=+59.570135897 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/941dffed-cb61-404c-a29b-85d5563613ae-calico-apiserver-certs") pod "calico-apiserver-6576df4768-429lk" (UID: "941dffed-cb61-404c-a29b-85d5563613ae") : secret "calico-apiserver-certs" not found Jul 2 08:23:36.836112 env[1571]: time="2024-07-02T08:23:36.836020339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6576df4768-ghqfw,Uid:660de226-1ce2-4273-9087-36d61e86887f,Namespace:calico-apiserver,Attempt:0,}" Jul 2 08:23:36.839233 env[1571]: time="2024-07-02T08:23:36.839157991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6576df4768-429lk,Uid:941dffed-cb61-404c-a29b-85d5563613ae,Namespace:calico-apiserver,Attempt:0,}" Jul 2 08:23:36.942060 systemd-networkd[1315]: cali0399795552c: Link UP Jul 2 08:23:36.998683 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:23:36.998768 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0399795552c: link becomes ready Jul 2 08:23:36.998819 systemd-networkd[1315]: cali0399795552c: Gained carrier Jul 2 08:23:36.999397 systemd-networkd[1315]: califf67dcf2022: Link UP Jul 2 08:23:36.999566 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf67dcf2022: link becomes ready Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.890 [INFO][5596] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0 calico-apiserver-6576df4768- calico-apiserver 660de226-1ce2-4273-9087-36d61e86887f 817 0 2024-07-02 08:23:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6576df4768 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-12d7dcb878 calico-apiserver-6576df4768-ghqfw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0399795552c [] []}} ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-ghqfw" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.890 [INFO][5596] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-ghqfw" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.913 [INFO][5642] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" HandleID="k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.921 [INFO][5642] ipam_plugin.go 264: Auto assigning IP ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" HandleID="k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051720), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-12d7dcb878", "pod":"calico-apiserver-6576df4768-ghqfw", "timestamp":"2024-07-02 08:23:36.913516848 +0000 UTC"}, Hostname:"ci-3510.3.5-a-12d7dcb878", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.921 [INFO][5642] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.921 [INFO][5642] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.921 [INFO][5642] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-12d7dcb878' Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.923 [INFO][5642] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.926 [INFO][5642] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.929 [INFO][5642] ipam.go 489: Trying affinity for 192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.930 [INFO][5642] ipam.go 155: Attempting to load block cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.932 [INFO][5642] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.932 [INFO][5642] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.0/26 handle="k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.933 [INFO][5642] ipam.go 1685: Creating new handle: k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.936 [INFO][5642] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.0/26 handle="k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.939 [INFO][5642] ipam.go 1216: Successfully claimed IPs: [192.168.4.5/26] block=192.168.4.0/26 handle="k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.939 [INFO][5642] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.5/26] handle="k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.939 [INFO][5642] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.004029 env[1571]: 2024-07-02 08:23:36.939 [INFO][5642] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.4.5/26] IPv6=[] ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" HandleID="k8s-pod-network.6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" Jul 2 08:23:37.004565 env[1571]: 2024-07-02 08:23:36.940 [INFO][5596] k8s.go 386: Populated endpoint ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-ghqfw" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0", GenerateName:"calico-apiserver-6576df4768-", Namespace:"calico-apiserver", SelfLink:"", UID:"660de226-1ce2-4273-9087-36d61e86887f", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 23, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6576df4768", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"", Pod:"calico-apiserver-6576df4768-ghqfw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.4.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0399795552c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.004565 env[1571]: 2024-07-02 08:23:36.941 [INFO][5596] k8s.go 387: Calico CNI using IPs: [192.168.4.5/32] ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-ghqfw" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" Jul 2 08:23:37.004565 env[1571]: 2024-07-02 08:23:36.941 [INFO][5596] dataplane_linux.go 68: Setting the host side veth name to cali0399795552c ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-ghqfw" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" Jul 2 08:23:37.004565 env[1571]: 2024-07-02 08:23:36.998 [INFO][5596] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-ghqfw" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" Jul 2 08:23:37.004565 env[1571]: 2024-07-02 08:23:36.999 [INFO][5596] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-ghqfw" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0", GenerateName:"calico-apiserver-6576df4768-", Namespace:"calico-apiserver", SelfLink:"", UID:"660de226-1ce2-4273-9087-36d61e86887f", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 23, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6576df4768", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd", Pod:"calico-apiserver-6576df4768-ghqfw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.4.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0399795552c", MAC:"8e:80:1e:8e:21:00", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.004565 env[1571]: 2024-07-02 08:23:37.002 [INFO][5596] k8s.go 500: Wrote updated endpoint to datastore ContainerID="6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-ghqfw" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--ghqfw-eth0" Jul 2 08:23:37.010170 env[1571]: time="2024-07-02T08:23:37.010128846Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:23:37.010170 env[1571]: time="2024-07-02T08:23:37.010154807Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:23:37.010170 env[1571]: time="2024-07-02T08:23:37.010162985Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:23:37.010302 env[1571]: time="2024-07-02T08:23:37.010232990Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd pid=5700 runtime=io.containerd.runc.v2 Jul 2 08:23:37.009000 audit[5701]: NETFILTER_CFG table=filter:111 family=2 entries=61 op=nft_register_chain pid=5701 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:23:37.009000 audit[5701]: SYSCALL arch=c000003e syscall=46 success=yes exit=30316 a0=3 a1=7ffe43fcb770 a2=0 a3=7ffe43fcb75c items=0 ppid=5289 pid=5701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.009000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:23:37.016281 systemd[1]: Started cri-containerd-6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd.scope. Jul 2 08:23:37.027866 systemd-networkd[1315]: califf67dcf2022: Gained carrier Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.033000 audit: BPF prog-id=174 op=LOAD Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326332633531306332343464323863656465396564613661326534 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326332633531306332343464323863656465396564613661326534 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit: BPF prog-id=175 op=LOAD Jul 2 08:23:37.034000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000248c70 items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326332633531306332343464323863656465396564613661326534 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit: BPF prog-id=176 op=LOAD Jul 2 08:23:37.034000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000248cb8 items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326332633531306332343464323863656465396564613661326534 Jul 2 08:23:37.034000 audit: BPF prog-id=176 op=UNLOAD Jul 2 08:23:37.034000 audit: BPF prog-id=175 op=UNLOAD Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.034000 audit: BPF prog-id=177 op=LOAD Jul 2 08:23:37.034000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0002490c8 items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326332633531306332343464323863656465396564613661326534 Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.891 [INFO][5607] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0 calico-apiserver-6576df4768- calico-apiserver 941dffed-cb61-404c-a29b-85d5563613ae 819 0 2024-07-02 08:23:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6576df4768 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-12d7dcb878 calico-apiserver-6576df4768-429lk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califf67dcf2022 [] []}} ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-429lk" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.891 [INFO][5607] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-429lk" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.913 [INFO][5643] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" HandleID="k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.921 [INFO][5643] ipam_plugin.go 264: Auto assigning IP ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" HandleID="k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000384640), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-12d7dcb878", "pod":"calico-apiserver-6576df4768-429lk", "timestamp":"2024-07-02 08:23:36.913649489 +0000 UTC"}, Hostname:"ci-3510.3.5-a-12d7dcb878", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.921 [INFO][5643] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.939 [INFO][5643] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.940 [INFO][5643] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-12d7dcb878' Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.941 [INFO][5643] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.944 [INFO][5643] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.947 [INFO][5643] ipam.go 489: Trying affinity for 192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.948 [INFO][5643] ipam.go 155: Attempting to load block cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.950 [INFO][5643] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.0/26 host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.950 [INFO][5643] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.0/26 handle="k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.951 [INFO][5643] ipam.go 1685: Creating new handle: k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.953 [INFO][5643] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.0/26 handle="k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.970 [INFO][5643] ipam.go 1216: Successfully claimed IPs: [192.168.4.6/26] block=192.168.4.0/26 handle="k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.970 [INFO][5643] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.6/26] handle="k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" host="ci-3510.3.5-a-12d7dcb878" Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.970 [INFO][5643] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.044417 env[1571]: 2024-07-02 08:23:36.970 [INFO][5643] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.4.6/26] IPv6=[] ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" HandleID="k8s-pod-network.1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" Jul 2 08:23:37.044915 env[1571]: 2024-07-02 08:23:36.971 [INFO][5607] k8s.go 386: Populated endpoint ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-429lk" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0", GenerateName:"calico-apiserver-6576df4768-", Namespace:"calico-apiserver", SelfLink:"", UID:"941dffed-cb61-404c-a29b-85d5563613ae", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 23, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6576df4768", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"", Pod:"calico-apiserver-6576df4768-429lk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.4.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf67dcf2022", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.044915 env[1571]: 2024-07-02 08:23:36.971 [INFO][5607] k8s.go 387: Calico CNI using IPs: [192.168.4.6/32] ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-429lk" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" Jul 2 08:23:37.044915 env[1571]: 2024-07-02 08:23:36.971 [INFO][5607] dataplane_linux.go 68: Setting the host side veth name to califf67dcf2022 ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-429lk" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" Jul 2 08:23:37.044915 env[1571]: 2024-07-02 08:23:37.027 [INFO][5607] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-429lk" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" Jul 2 08:23:37.044915 env[1571]: 2024-07-02 08:23:37.039 [INFO][5607] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-429lk" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0", GenerateName:"calico-apiserver-6576df4768-", Namespace:"calico-apiserver", SelfLink:"", UID:"941dffed-cb61-404c-a29b-85d5563613ae", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 23, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6576df4768", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec", Pod:"calico-apiserver-6576df4768-429lk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.4.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf67dcf2022", MAC:"2e:11:c2:7a:18:48", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.044915 env[1571]: 2024-07-02 08:23:37.043 [INFO][5607] k8s.go 500: Wrote updated endpoint to datastore ContainerID="1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec" Namespace="calico-apiserver" Pod="calico-apiserver-6576df4768-429lk" WorkloadEndpoint="ci--3510.3.5--a--12d7dcb878-k8s-calico--apiserver--6576df4768--429lk-eth0" Jul 2 08:23:37.049856 env[1571]: time="2024-07-02T08:23:37.049813146Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:23:37.049856 env[1571]: time="2024-07-02T08:23:37.049836564Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:23:37.049856 env[1571]: time="2024-07-02T08:23:37.049843641Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:23:37.050018 env[1571]: time="2024-07-02T08:23:37.049925373Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec pid=5749 runtime=io.containerd.runc.v2 Jul 2 08:23:37.049000 audit[5755]: NETFILTER_CFG table=filter:112 family=2 entries=45 op=nft_register_chain pid=5755 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:23:37.049000 audit[5755]: SYSCALL arch=c000003e syscall=46 success=yes exit=23096 a0=3 a1=7fff31558ed0 a2=0 a3=7fff31558ebc items=0 ppid=5289 pid=5755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.049000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:23:37.052618 env[1571]: time="2024-07-02T08:23:37.052591759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6576df4768-ghqfw,Uid:660de226-1ce2-4273-9087-36d61e86887f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd\"" Jul 2 08:23:37.053355 env[1571]: time="2024-07-02T08:23:37.053343497Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 08:23:37.055288 systemd[1]: Started cri-containerd-1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec.scope. Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit: BPF prog-id=178 op=LOAD Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5749 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653764333538366637363436646236306637613861343564376434 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5749 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653764333538366637363436646236306637613861343564376434 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit: BPF prog-id=179 op=LOAD Jul 2 08:23:37.060000 audit[5765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000f1ce0 items=0 ppid=5749 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653764333538366637363436646236306637613861343564376434 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit: BPF prog-id=180 op=LOAD Jul 2 08:23:37.060000 audit[5765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000f1d28 items=0 ppid=5749 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653764333538366637363436646236306637613861343564376434 Jul 2 08:23:37.060000 audit: BPF prog-id=180 op=UNLOAD Jul 2 08:23:37.060000 audit: BPF prog-id=179 op=UNLOAD Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { perfmon } for pid=5765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit[5765]: AVC avc: denied { bpf } for pid=5765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:37.060000 audit: BPF prog-id=181 op=LOAD Jul 2 08:23:37.060000 audit[5765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f2138 items=0 ppid=5749 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:37.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653764333538366637363436646236306637613861343564376434 Jul 2 08:23:37.078754 env[1571]: time="2024-07-02T08:23:37.078734250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6576df4768-429lk,Uid:941dffed-cb61-404c-a29b-85d5563613ae,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec\"" Jul 2 08:23:37.096058 env[1571]: time="2024-07-02T08:23:37.095840218Z" level=info msg="StopPodSandbox for \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\"" Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.150 [WARNING][5806] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0", GenerateName:"calico-kube-controllers-b5946468f-", Namespace:"calico-system", SelfLink:"", UID:"0c293c6c-0ee4-43d7-a767-415ecbdd45dd", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b5946468f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0", Pod:"calico-kube-controllers-b5946468f-wsv8p", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali42586007edb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.150 [INFO][5806] k8s.go 608: Cleaning up netns ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.150 [INFO][5806] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" iface="eth0" netns="" Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.150 [INFO][5806] k8s.go 615: Releasing IP address(es) ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.150 [INFO][5806] utils.go 188: Calico CNI releasing IP address ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.164 [INFO][5822] ipam_plugin.go 411: Releasing address using handleID ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.164 [INFO][5822] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.165 [INFO][5822] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.170 [WARNING][5822] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.170 [INFO][5822] ipam_plugin.go 439: Releasing address using workloadID ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.171 [INFO][5822] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.173310 env[1571]: 2024-07-02 08:23:37.172 [INFO][5806] k8s.go 621: Teardown processing complete. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:37.173798 env[1571]: time="2024-07-02T08:23:37.173308959Z" level=info msg="TearDown network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\" successfully" Jul 2 08:23:37.173798 env[1571]: time="2024-07-02T08:23:37.173337871Z" level=info msg="StopPodSandbox for \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\" returns successfully" Jul 2 08:23:37.173798 env[1571]: time="2024-07-02T08:23:37.173780118Z" level=info msg="RemovePodSandbox for \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\"" Jul 2 08:23:37.173883 env[1571]: time="2024-07-02T08:23:37.173808634Z" level=info msg="Forcibly stopping sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\"" Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.206 [WARNING][5851] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0", GenerateName:"calico-kube-controllers-b5946468f-", Namespace:"calico-system", SelfLink:"", UID:"0c293c6c-0ee4-43d7-a767-415ecbdd45dd", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b5946468f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"fcaff974ff35da756757662dac18afee85f67031ee39b58faee0f986ff25e0f0", Pod:"calico-kube-controllers-b5946468f-wsv8p", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali42586007edb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.206 [INFO][5851] k8s.go 608: Cleaning up netns ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.206 [INFO][5851] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" iface="eth0" netns="" Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.206 [INFO][5851] k8s.go 615: Releasing IP address(es) ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.207 [INFO][5851] utils.go 188: Calico CNI releasing IP address ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.241 [INFO][5868] ipam_plugin.go 411: Releasing address using handleID ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.241 [INFO][5868] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.241 [INFO][5868] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.247 [WARNING][5868] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.247 [INFO][5868] ipam_plugin.go 439: Releasing address using workloadID ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" HandleID="k8s-pod-network.97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Workload="ci--3510.3.5--a--12d7dcb878-k8s-calico--kube--controllers--b5946468f--wsv8p-eth0" Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.248 [INFO][5868] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.250439 env[1571]: 2024-07-02 08:23:37.249 [INFO][5851] k8s.go 621: Teardown processing complete. ContainerID="97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd" Jul 2 08:23:37.250926 env[1571]: time="2024-07-02T08:23:37.250461145Z" level=info msg="TearDown network for sandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\" successfully" Jul 2 08:23:37.252269 env[1571]: time="2024-07-02T08:23:37.252251228Z" level=info msg="RemovePodSandbox \"97d64cfb9139902b897df524b0870448f7453101480a42e76aa2c49fe90b9dbd\" returns successfully" Jul 2 08:23:37.252561 env[1571]: time="2024-07-02T08:23:37.252536952Z" level=info msg="StopPodSandbox for \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\"" Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.275 [WARNING][5903] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"deaa368b-02e9-4638-9ae0-7c4d5931182e", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2", Pod:"coredns-7db6d8ff4d-2cvcs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7abd276b09c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.275 [INFO][5903] k8s.go 608: Cleaning up netns ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.275 [INFO][5903] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" iface="eth0" netns="" Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.275 [INFO][5903] k8s.go 615: Releasing IP address(es) ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.275 [INFO][5903] utils.go 188: Calico CNI releasing IP address ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.288 [INFO][5920] ipam_plugin.go 411: Releasing address using handleID ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.288 [INFO][5920] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.288 [INFO][5920] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.293 [WARNING][5920] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.293 [INFO][5920] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.294 [INFO][5920] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.296318 env[1571]: 2024-07-02 08:23:37.295 [INFO][5903] k8s.go 621: Teardown processing complete. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:37.296758 env[1571]: time="2024-07-02T08:23:37.296338473Z" level=info msg="TearDown network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\" successfully" Jul 2 08:23:37.296758 env[1571]: time="2024-07-02T08:23:37.296365933Z" level=info msg="StopPodSandbox for \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\" returns successfully" Jul 2 08:23:37.296758 env[1571]: time="2024-07-02T08:23:37.296651754Z" level=info msg="RemovePodSandbox for \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\"" Jul 2 08:23:37.296758 env[1571]: time="2024-07-02T08:23:37.296682381Z" level=info msg="Forcibly stopping sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\"" Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.319 [WARNING][5949] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"deaa368b-02e9-4638-9ae0-7c4d5931182e", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"53733aa7a2876c78656221505a82c81c95e6c339384233a06dabe792868148b2", Pod:"coredns-7db6d8ff4d-2cvcs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7abd276b09c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.319 [INFO][5949] k8s.go 608: Cleaning up netns ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.319 [INFO][5949] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" iface="eth0" netns="" Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.319 [INFO][5949] k8s.go 615: Releasing IP address(es) ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.319 [INFO][5949] utils.go 188: Calico CNI releasing IP address ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.332 [INFO][5968] ipam_plugin.go 411: Releasing address using handleID ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.332 [INFO][5968] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.332 [INFO][5968] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.337 [WARNING][5968] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.337 [INFO][5968] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" HandleID="k8s-pod-network.b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--2cvcs-eth0" Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.339 [INFO][5968] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.340819 env[1571]: 2024-07-02 08:23:37.339 [INFO][5949] k8s.go 621: Teardown processing complete. ContainerID="b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110" Jul 2 08:23:37.340819 env[1571]: time="2024-07-02T08:23:37.340800423Z" level=info msg="TearDown network for sandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\" successfully" Jul 2 08:23:37.342474 env[1571]: time="2024-07-02T08:23:37.342456412Z" level=info msg="RemovePodSandbox \"b3e5a937aeaea67e63e6f256ad1ff1e0e95757ff79cd14766432d4e210018110\" returns successfully" Jul 2 08:23:37.342653 env[1571]: time="2024-07-02T08:23:37.342638413Z" level=info msg="StopPodSandbox for \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\"" Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.365 [WARNING][5998] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f", ResourceVersion:"683", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc", Pod:"coredns-7db6d8ff4d-gfsgs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali043f8bcd82b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.365 [INFO][5998] k8s.go 608: Cleaning up netns ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.365 [INFO][5998] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" iface="eth0" netns="" Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.365 [INFO][5998] k8s.go 615: Releasing IP address(es) ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.365 [INFO][5998] utils.go 188: Calico CNI releasing IP address ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.378 [INFO][6016] ipam_plugin.go 411: Releasing address using handleID ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.379 [INFO][6016] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.379 [INFO][6016] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.383 [WARNING][6016] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.383 [INFO][6016] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.384 [INFO][6016] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.386527 env[1571]: 2024-07-02 08:23:37.385 [INFO][5998] k8s.go 621: Teardown processing complete. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:37.386527 env[1571]: time="2024-07-02T08:23:37.386485565Z" level=info msg="TearDown network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\" successfully" Jul 2 08:23:37.386527 env[1571]: time="2024-07-02T08:23:37.386508352Z" level=info msg="StopPodSandbox for \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\" returns successfully" Jul 2 08:23:37.387018 env[1571]: time="2024-07-02T08:23:37.386825149Z" level=info msg="RemovePodSandbox for \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\"" Jul 2 08:23:37.387018 env[1571]: time="2024-07-02T08:23:37.386847712Z" level=info msg="Forcibly stopping sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\"" Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.409 [WARNING][6045] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ab2d36ff-a7bc-4bc3-bc42-92fabcd96c4f", ResourceVersion:"683", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"969fd09de922b6055e77c8c30b8495e04ab3d8300199fcd3c85fb081d3515bcc", Pod:"coredns-7db6d8ff4d-gfsgs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali043f8bcd82b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.410 [INFO][6045] k8s.go 608: Cleaning up netns ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.410 [INFO][6045] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" iface="eth0" netns="" Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.410 [INFO][6045] k8s.go 615: Releasing IP address(es) ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.410 [INFO][6045] utils.go 188: Calico CNI releasing IP address ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.423 [INFO][6060] ipam_plugin.go 411: Releasing address using handleID ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.423 [INFO][6060] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.423 [INFO][6060] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.427 [WARNING][6060] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.427 [INFO][6060] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" HandleID="k8s-pod-network.a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Workload="ci--3510.3.5--a--12d7dcb878-k8s-coredns--7db6d8ff4d--gfsgs-eth0" Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.429 [INFO][6060] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.430492 env[1571]: 2024-07-02 08:23:37.429 [INFO][6045] k8s.go 621: Teardown processing complete. ContainerID="a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f" Jul 2 08:23:37.430914 env[1571]: time="2024-07-02T08:23:37.430497977Z" level=info msg="TearDown network for sandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\" successfully" Jul 2 08:23:37.432125 env[1571]: time="2024-07-02T08:23:37.432108690Z" level=info msg="RemovePodSandbox \"a9d64cd12ace36d9a968c37f368a3b3832e7cf3c1c2c23825e31cfc5f8b1217f\" returns successfully" Jul 2 08:23:37.432456 env[1571]: time="2024-07-02T08:23:37.432438343Z" level=info msg="StopPodSandbox for \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\"" Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.454 [WARNING][6087] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"85a5a732-761c-425d-b1b7-35c0263f2e7e", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6", Pod:"csi-node-driver-p2f4l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie3dd6d0a7c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.455 [INFO][6087] k8s.go 608: Cleaning up netns ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.455 [INFO][6087] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" iface="eth0" netns="" Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.455 [INFO][6087] k8s.go 615: Releasing IP address(es) ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.455 [INFO][6087] utils.go 188: Calico CNI releasing IP address ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.468 [INFO][6104] ipam_plugin.go 411: Releasing address using handleID ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.468 [INFO][6104] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.468 [INFO][6104] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.473 [WARNING][6104] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.473 [INFO][6104] ipam_plugin.go 439: Releasing address using workloadID ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.474 [INFO][6104] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.476450 env[1571]: 2024-07-02 08:23:37.475 [INFO][6087] k8s.go 621: Teardown processing complete. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:37.476450 env[1571]: time="2024-07-02T08:23:37.476442969Z" level=info msg="TearDown network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\" successfully" Jul 2 08:23:37.476989 env[1571]: time="2024-07-02T08:23:37.476467581Z" level=info msg="StopPodSandbox for \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\" returns successfully" Jul 2 08:23:37.476989 env[1571]: time="2024-07-02T08:23:37.476800679Z" level=info msg="RemovePodSandbox for \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\"" Jul 2 08:23:37.476989 env[1571]: time="2024-07-02T08:23:37.476830927Z" level=info msg="Forcibly stopping sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\"" Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.511 [WARNING][6134] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"85a5a732-761c-425d-b1b7-35c0263f2e7e", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 22, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-12d7dcb878", ContainerID:"a4224af04bf15d22280cd9bd2877065061c6bc64bb40c58cd2438fe436cb25c6", Pod:"csi-node-driver-p2f4l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie3dd6d0a7c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.511 [INFO][6134] k8s.go 608: Cleaning up netns ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.511 [INFO][6134] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" iface="eth0" netns="" Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.511 [INFO][6134] k8s.go 615: Releasing IP address(es) ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.511 [INFO][6134] utils.go 188: Calico CNI releasing IP address ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.529 [INFO][6151] ipam_plugin.go 411: Releasing address using handleID ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.529 [INFO][6151] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.529 [INFO][6151] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.533 [WARNING][6151] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.534 [INFO][6151] ipam_plugin.go 439: Releasing address using workloadID ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" HandleID="k8s-pod-network.113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Workload="ci--3510.3.5--a--12d7dcb878-k8s-csi--node--driver--p2f4l-eth0" Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.535 [INFO][6151] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:23:37.536918 env[1571]: 2024-07-02 08:23:37.536 [INFO][6134] k8s.go 621: Teardown processing complete. ContainerID="113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27" Jul 2 08:23:37.536918 env[1571]: time="2024-07-02T08:23:37.536900721Z" level=info msg="TearDown network for sandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\" successfully" Jul 2 08:23:37.538622 env[1571]: time="2024-07-02T08:23:37.538605273Z" level=info msg="RemovePodSandbox \"113c4cd0346b791a705927e2c23e0868597331d9d532b0bd2d69605487358b27\" returns successfully" Jul 2 08:23:38.045730 systemd-networkd[1315]: cali0399795552c: Gained IPv6LL Jul 2 08:23:38.557727 systemd-networkd[1315]: califf67dcf2022: Gained IPv6LL Jul 2 08:23:38.702000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:38.730959 kernel: kauditd_printk_skb: 146 callbacks suppressed Jul 2 08:23:38.731083 kernel: audit: type=1400 audit(1719908618.702:1211): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:38.702000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ea62e0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:38.937009 kernel: audit: type=1300 audit(1719908618.702:1211): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ea62e0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:38.937085 kernel: audit: type=1327 audit(1719908618.702:1211): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:38.702000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:39.027490 kernel: audit: type=1400 audit(1719908618.703:1212): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:38.703000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:39.115044 kernel: audit: type=1300 audit(1719908618.703:1212): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e3b260 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:38.703000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e3b260 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:39.232135 kernel: audit: type=1327 audit(1719908618.703:1212): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:38.703000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:39.322773 kernel: audit: type=1400 audit(1719908618.704:1213): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:38.704000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:39.410348 kernel: audit: type=1300 audit(1719908618.704:1213): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020307a0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:38.704000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020307a0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:39.527419 kernel: audit: type=1327 audit(1719908618.704:1213): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:38.704000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:39.618129 kernel: audit: type=1400 audit(1719908618.705:1214): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:38.705000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:23:38.705000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e3b400 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:23:38.705000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:23:39.706341 env[1571]: time="2024-07-02T08:23:39.706310775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:39.706853 env[1571]: time="2024-07-02T08:23:39.706840787Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:39.707896 env[1571]: time="2024-07-02T08:23:39.707884992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:39.708448 env[1571]: time="2024-07-02T08:23:39.708435975Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:39.709009 env[1571]: time="2024-07-02T08:23:39.708997275Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 08:23:39.709488 env[1571]: time="2024-07-02T08:23:39.709477740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 08:23:39.710019 env[1571]: time="2024-07-02T08:23:39.710006125Z" level=info msg="CreateContainer within sandbox \"6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 08:23:39.714112 env[1571]: time="2024-07-02T08:23:39.714089866Z" level=info msg="CreateContainer within sandbox \"6d2c2c510c244d28cede9eda6a2e4564cb774f8b2e95062aac0242ebf34a1edd\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"be2e63bb4ddae5feeede10244c81457c895008db10df729812ea192b0ae64999\"" Jul 2 08:23:39.714330 env[1571]: time="2024-07-02T08:23:39.714319614Z" level=info msg="StartContainer for \"be2e63bb4ddae5feeede10244c81457c895008db10df729812ea192b0ae64999\"" Jul 2 08:23:39.723201 systemd[1]: Started cri-containerd-be2e63bb4ddae5feeede10244c81457c895008db10df729812ea192b0ae64999.scope. Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.726000 audit: BPF prog-id=182 op=LOAD Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5700 pid=6175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:39.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326536336262346464616535666565656465313032343463383134 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5700 pid=6175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:39.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326536336262346464616535666565656465313032343463383134 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit: BPF prog-id=183 op=LOAD Jul 2 08:23:39.727000 audit[6175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d4b80 items=0 ppid=5700 pid=6175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:39.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326536336262346464616535666565656465313032343463383134 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit: BPF prog-id=184 op=LOAD Jul 2 08:23:39.727000 audit[6175]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d4bc8 items=0 ppid=5700 pid=6175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:39.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326536336262346464616535666565656465313032343463383134 Jul 2 08:23:39.727000 audit: BPF prog-id=184 op=UNLOAD Jul 2 08:23:39.727000 audit: BPF prog-id=183 op=UNLOAD Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { perfmon } for pid=6175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit[6175]: AVC avc: denied { bpf } for pid=6175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:39.727000 audit: BPF prog-id=185 op=LOAD Jul 2 08:23:39.727000 audit[6175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002d4fd8 items=0 ppid=5700 pid=6175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:39.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326536336262346464616535666565656465313032343463383134 Jul 2 08:23:39.745174 env[1571]: time="2024-07-02T08:23:39.745149917Z" level=info msg="StartContainer for \"be2e63bb4ddae5feeede10244c81457c895008db10df729812ea192b0ae64999\" returns successfully" Jul 2 08:23:39.993000 audit[6185]: AVC avc: denied { watch } for pid=6185 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.3666256278/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c103,c613 tclass=file permissive=0 Jul 2 08:23:39.993000 audit[6185]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cb8280 a2=fc6 a3=0 items=0 ppid=5700 pid=6185 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 key=(null) Jul 2 08:23:39.993000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:23:40.043353 env[1571]: time="2024-07-02T08:23:40.043299370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:40.044063 env[1571]: time="2024-07-02T08:23:40.044015446Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:40.044604 env[1571]: time="2024-07-02T08:23:40.044564536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:40.045247 env[1571]: time="2024-07-02T08:23:40.045222137Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:23:40.045492 env[1571]: time="2024-07-02T08:23:40.045477398Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 08:23:40.046984 env[1571]: time="2024-07-02T08:23:40.046944054Z" level=info msg="CreateContainer within sandbox \"1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 08:23:40.050796 env[1571]: time="2024-07-02T08:23:40.050752884Z" level=info msg="CreateContainer within sandbox \"1de7d3586f7646db60f7a8a45d7d46d61d36d88d767bfb1ede9090b79b5cc9ec\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"bc17afb25c3cb01a2d201944f7b313123dd22bd92b6fec16de7b581991d63652\"" Jul 2 08:23:40.051034 env[1571]: time="2024-07-02T08:23:40.051021745Z" level=info msg="StartContainer for \"bc17afb25c3cb01a2d201944f7b313123dd22bd92b6fec16de7b581991d63652\"" Jul 2 08:23:40.059340 systemd[1]: Started cri-containerd-bc17afb25c3cb01a2d201944f7b313123dd22bd92b6fec16de7b581991d63652.scope. Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit: BPF prog-id=186 op=LOAD Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=5749 pid=6224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313761666232356333636230316132643230313934346637623331 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=5749 pid=6224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313761666232356333636230316132643230313934346637623331 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.064000 audit: BPF prog-id=187 op=LOAD Jul 2 08:23:40.064000 audit[6224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002e7dc0 items=0 ppid=5749 pid=6224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313761666232356333636230316132643230313934346637623331 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit: BPF prog-id=188 op=LOAD Jul 2 08:23:40.065000 audit[6224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002e7e08 items=0 ppid=5749 pid=6224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313761666232356333636230316132643230313934346637623331 Jul 2 08:23:40.065000 audit: BPF prog-id=188 op=UNLOAD Jul 2 08:23:40.065000 audit: BPF prog-id=187 op=UNLOAD Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { perfmon } for pid=6224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit[6224]: AVC avc: denied { bpf } for pid=6224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:23:40.065000 audit: BPF prog-id=189 op=LOAD Jul 2 08:23:40.065000 audit[6224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003c6218 items=0 ppid=5749 pid=6224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313761666232356333636230316132643230313934346637623331 Jul 2 08:23:40.084459 env[1571]: time="2024-07-02T08:23:40.084399805Z" level=info msg="StartContainer for \"bc17afb25c3cb01a2d201944f7b313123dd22bd92b6fec16de7b581991d63652\" returns successfully" Jul 2 08:23:40.374189 kubelet[2607]: I0702 08:23:40.374123 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6576df4768-429lk" podStartSLOduration=2.407347836 podStartE2EDuration="5.374099633s" podCreationTimestamp="2024-07-02 08:23:35 +0000 UTC" firstStartedPulling="2024-07-02 08:23:37.079310946 +0000 UTC m=+60.038150850" lastFinishedPulling="2024-07-02 08:23:40.046062739 +0000 UTC m=+63.004902647" observedRunningTime="2024-07-02 08:23:40.373362939 +0000 UTC m=+63.332202889" watchObservedRunningTime="2024-07-02 08:23:40.374099633 +0000 UTC m=+63.332939554" Jul 2 08:23:40.382902 kubelet[2607]: I0702 08:23:40.382848 2607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6576df4768-ghqfw" podStartSLOduration=2.7266338279999998 podStartE2EDuration="5.382831127s" podCreationTimestamp="2024-07-02 08:23:35 +0000 UTC" firstStartedPulling="2024-07-02 08:23:37.053211938 +0000 UTC m=+60.012051843" lastFinishedPulling="2024-07-02 08:23:39.709409237 +0000 UTC m=+62.668249142" observedRunningTime="2024-07-02 08:23:40.38241701 +0000 UTC m=+63.341256940" watchObservedRunningTime="2024-07-02 08:23:40.382831127 +0000 UTC m=+63.341671040" Jul 2 08:23:40.382000 audit[6268]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=6268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:40.382000 audit[6268]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe04e5a710 a2=0 a3=7ffe04e5a6fc items=0 ppid=2865 pid=6268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:40.389000 audit[6234]: AVC avc: denied { watch } for pid=6234 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.1169416610/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c763 tclass=file permissive=0 Jul 2 08:23:40.389000 audit[6234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000694180 a2=fc6 a3=0 items=0 ppid=5749 pid=6234 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 key=(null) Jul 2 08:23:40.389000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:23:40.382000 audit[6268]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=6268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:40.382000 audit[6268]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe04e5a710 a2=0 a3=7ffe04e5a6fc items=0 ppid=2865 pid=6268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:40.402000 audit[6270]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=6270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:40.402000 audit[6270]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffeac13a420 a2=0 a3=7ffeac13a40c items=0 ppid=2865 pid=6270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:40.409000 audit[6270]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=6270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:23:40.409000 audit[6270]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeac13a420 a2=0 a3=7ffeac13a40c items=0 ppid=2865 pid=6270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:23:40.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:23:41.368891 kubelet[2607]: I0702 08:23:41.368808 2607 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 08:23:41.368891 kubelet[2607]: I0702 08:23:41.368853 2607 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 08:24:08.466427 kubelet[2607]: I0702 08:24:08.466336 2607 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 08:24:08.541000 audit[6359]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=6359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:24:08.576403 kernel: kauditd_printk_skb: 134 callbacks suppressed Jul 2 08:24:08.576484 kernel: audit: type=1325 audit(1719908648.541:1257): table=filter:117 family=2 entries=9 op=nft_register_rule pid=6359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:24:08.541000 audit[6359]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc577622f0 a2=0 a3=7ffc577622dc items=0 ppid=2865 pid=6359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:24:08.727636 kernel: audit: type=1300 audit(1719908648.541:1257): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc577622f0 a2=0 a3=7ffc577622dc items=0 ppid=2865 pid=6359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:24:08.727675 kernel: audit: type=1327 audit(1719908648.541:1257): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:24:08.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:24:08.729000 audit[6359]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=6359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:24:08.841238 kernel: audit: type=1325 audit(1719908648.729:1258): table=nat:118 family=2 entries=27 op=nft_register_chain pid=6359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:24:08.841278 kernel: audit: type=1300 audit(1719908648.729:1258): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc577622f0 a2=0 a3=7ffc577622dc items=0 ppid=2865 pid=6359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:24:08.729000 audit[6359]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc577622f0 a2=0 a3=7ffc577622dc items=0 ppid=2865 pid=6359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:24:08.937959 kernel: audit: type=1327 audit(1719908648.729:1258): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:24:08.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:24:33.138000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.138000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006b9560 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:33.355646 kernel: audit: type=1400 audit(1719908673.138:1259): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.355705 kernel: audit: type=1300 audit(1719908673.138:1259): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006b9560 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:33.355724 kernel: audit: type=1327 audit(1719908673.138:1259): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:33.138000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:33.449295 kernel: audit: type=1400 audit(1719908673.138:1260): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.138000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.539590 kernel: audit: type=1300 audit(1719908673.138:1260): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010885e0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:33.138000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010885e0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:33.660280 kernel: audit: type=1327 audit(1719908673.138:1260): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:33.138000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:33.753854 kernel: audit: type=1400 audit(1719908673.163:1261): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0107edf20 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:24:33.943977 kernel: audit: type=1300 audit(1719908673.163:1261): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0107edf20 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:24:33.944044 kernel: audit: type=1400 audit(1719908673.163:1262): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:34.035469 kernel: audit: type=1327 audit(1719908673.163:1261): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:24:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:24:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00a2467c0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:24:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:24:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ee95bf0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:24:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:24:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0049e3380 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:24:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:24:33.163000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.163000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c008578180 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:24:33.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:24:33.164000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:33.164000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0049e3b60 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:24:33.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:24:36.394589 kubelet[2607]: I0702 08:24:36.394447 2607 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 08:24:36.414000 audit[6442]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=6442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:24:36.414000 audit[6442]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed8209f20 a2=0 a3=7ffed8209f0c items=0 ppid=2865 pid=6442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:24:36.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:24:36.414000 audit[6442]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=6442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:24:36.414000 audit[6442]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffed8209f20 a2=0 a3=7ffed8209f0c items=0 ppid=2865 pid=6442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:24:36.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:24:38.704000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:38.732432 kernel: kauditd_printk_skb: 20 callbacks suppressed Jul 2 08:24:38.732498 kernel: audit: type=1400 audit(1719908678.704:1269): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:38.704000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00238d1a0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:38.824638 kernel: audit: type=1300 audit(1719908678.704:1269): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00238d1a0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:38.704000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:39.041757 kernel: audit: type=1327 audit(1719908678.704:1269): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:39.041839 kernel: audit: type=1400 audit(1719908678.705:1270): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:38.705000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:39.133470 kernel: audit: type=1300 audit(1719908678.705:1270): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0035227c0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:38.705000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0035227c0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:39.256409 kernel: audit: type=1327 audit(1719908678.705:1270): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:38.705000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:39.350470 kernel: audit: type=1400 audit(1719908678.705:1271): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:38.705000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:39.440696 kernel: audit: type=1300 audit(1719908678.705:1271): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001088c40 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:38.705000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001088c40 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:39.561646 kernel: audit: type=1327 audit(1719908678.705:1271): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:38.705000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:38.706000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:39.745307 kernel: audit: type=1400 audit(1719908678.706:1272): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:24:38.706000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00238d360 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:24:38.706000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:24:39.995000 audit[6185]: AVC avc: denied { watch } for pid=6185 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.3666256278/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c103,c613 tclass=file permissive=0 Jul 2 08:24:39.995000 audit[6185]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cb9bc0 a2=fc6 a3=0 items=0 ppid=5700 pid=6185 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 key=(null) Jul 2 08:24:39.995000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:24:40.391000 audit[6234]: AVC avc: denied { watch } for pid=6234 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.1169416610/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c763 tclass=file permissive=0 Jul 2 08:24:40.391000 audit[6234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a368a0 a2=fc6 a3=0 items=0 ppid=5749 pid=6234 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 key=(null) Jul 2 08:24:40.391000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:25:33.140000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.167883 kernel: kauditd_printk_skb: 8 callbacks suppressed Jul 2 08:25:33.167990 kernel: audit: type=1400 audit(1719908733.140:1275): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.140000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00324c380 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:33.377327 kernel: audit: type=1300 audit(1719908733.140:1275): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00324c380 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:33.377372 kernel: audit: type=1327 audit(1719908733.140:1275): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:33.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:33.469826 kernel: audit: type=1400 audit(1719908733.140:1276): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.140000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.560509 kernel: audit: type=1300 audit(1719908733.140:1276): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002500c30 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:33.140000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002500c30 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:33.680918 kernel: audit: type=1327 audit(1719908733.140:1276): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:33.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:33.774005 kernel: audit: type=1400 audit(1719908733.164:1277): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.164000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.863773 kernel: audit: type=1300 audit(1719908733.164:1277): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01179c880 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:25:33.164000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01179c880 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:25:33.962120 kernel: audit: type=1327 audit(1719908733.164:1277): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:25:33.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:25:34.055340 kernel: audit: type=1400 audit(1719908733.165:1278): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009713340 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:25:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:25:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c005e54180 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:25:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0074f7e00 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:25:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:25:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:25:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00645b770 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:25:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:25:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c007918a80 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:25:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:25:38.704000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:38.732935 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 08:25:38.733048 kernel: audit: type=1400 audit(1719908738.704:1283): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:38.704000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e06240 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:38.824635 kernel: audit: type=1300 audit(1719908738.704:1283): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e06240 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:38.704000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:39.038097 kernel: audit: type=1327 audit(1719908738.704:1283): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:39.038133 kernel: audit: type=1400 audit(1719908738.706:1284): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:38.706000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:39.128551 kernel: audit: type=1300 audit(1719908738.706:1284): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fa22a0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:38.706000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fa22a0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:39.248920 kernel: audit: type=1327 audit(1719908738.706:1284): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:38.706000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:39.342089 kernel: audit: type=1400 audit(1719908738.707:1285): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:38.707000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:39.431951 kernel: audit: type=1300 audit(1719908738.707:1285): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e06280 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:38.707000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e06280 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:39.552583 kernel: audit: type=1327 audit(1719908738.707:1285): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:38.707000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:39.645801 kernel: audit: type=1400 audit(1719908738.707:1286): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:38.707000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:25:38.707000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022a6000 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:25:38.707000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:25:39.996000 audit[6185]: AVC avc: denied { watch } for pid=6185 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.3666256278/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c103,c613 tclass=file permissive=0 Jul 2 08:25:39.996000 audit[6185]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0014ce000 a2=fc6 a3=0 items=0 ppid=5700 pid=6185 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 key=(null) Jul 2 08:25:39.996000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:25:40.392000 audit[6234]: AVC avc: denied { watch } for pid=6234 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.1169416610/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c763 tclass=file permissive=0 Jul 2 08:25:40.392000 audit[6234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f1b020 a2=fc6 a3=0 items=0 ppid=5749 pid=6234 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 key=(null) Jul 2 08:25:40.392000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:26:33.140000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.167685 kernel: kauditd_printk_skb: 8 callbacks suppressed Jul 2 08:26:33.167743 kernel: audit: type=1400 audit(1719908793.140:1289): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.140000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ff4480 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:33.379461 kernel: audit: type=1300 audit(1719908793.140:1289): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ff4480 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:33.379502 kernel: audit: type=1327 audit(1719908793.140:1289): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:33.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:33.471873 kernel: audit: type=1400 audit(1719908793.140:1290): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.140000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.561196 kernel: audit: type=1300 audit(1719908793.140:1290): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00324d920 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:33.140000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00324d920 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:33.681629 kernel: audit: type=1327 audit(1719908793.140:1290): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:33.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:33.774691 kernel: audit: type=1400 audit(1719908793.165:1291): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.865593 kernel: audit: type=1300 audit(1719908793.165:1291): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00e87e7e0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:26:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00e87e7e0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:26:33.964053 kernel: audit: type=1327 audit(1719908793.165:1291): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:26:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:26:34.057101 kernel: audit: type=1400 audit(1719908793.165:1292): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c002de4e60 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:26:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0078aec00 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:26:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:26:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:26:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00741b200 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:26:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:26:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c011cc6300 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:26:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:26:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00e9531c0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:26:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:26:38.705000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:38.733326 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 08:26:38.733375 kernel: audit: type=1400 audit(1719908798.705:1297): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:38.705000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001293a20 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:38.943417 kernel: audit: type=1300 audit(1719908798.705:1297): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001293a20 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:38.943452 kernel: audit: type=1327 audit(1719908798.705:1297): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:38.705000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:39.037516 kernel: audit: type=1400 audit(1719908798.708:1298): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:38.708000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:38.708000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00008f120 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:39.248060 kernel: audit: type=1300 audit(1719908798.708:1298): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00008f120 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:39.248105 kernel: audit: type=1327 audit(1719908798.708:1298): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:38.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:39.341225 kernel: audit: type=1400 audit(1719908798.708:1299): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:38.708000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:39.431042 kernel: audit: type=1300 audit(1719908798.708:1299): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ea67c0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:38.708000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ea67c0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:39.551427 kernel: audit: type=1327 audit(1719908798.708:1299): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:38.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:38.708000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:39.734400 kernel: audit: type=1400 audit(1719908798.708:1300): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:26:38.708000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000e06ea0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:26:38.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:26:39.995000 audit[6185]: AVC avc: denied { watch } for pid=6185 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.3666256278/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c103,c613 tclass=file permissive=0 Jul 2 08:26:39.995000 audit[6185]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001026000 a2=fc6 a3=0 items=0 ppid=5700 pid=6185 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 key=(null) Jul 2 08:26:39.995000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:26:40.392000 audit[6234]: AVC avc: denied { watch } for pid=6234 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.1169416610/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c763 tclass=file permissive=0 Jul 2 08:26:40.392000 audit[6234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019f0080 a2=fc6 a3=0 items=0 ppid=5749 pid=6234 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 key=(null) Jul 2 08:26:40.392000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:27:33.140000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.169629 kernel: kauditd_printk_skb: 8 callbacks suppressed Jul 2 08:27:33.169701 kernel: audit: type=1400 audit(1719908853.140:1303): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.140000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021a7ee0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:33.378355 kernel: audit: type=1300 audit(1719908853.140:1303): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021a7ee0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:33.378399 kernel: audit: type=1327 audit(1719908853.140:1303): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:33.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:33.470795 kernel: audit: type=1400 audit(1719908853.141:1304): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.141000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.561318 kernel: audit: type=1300 audit(1719908853.141:1304): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ff5620 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:33.141000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ff5620 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:33.681800 kernel: audit: type=1327 audit(1719908853.141:1304): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:33.141000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.865921 kernel: audit: type=1400 audit(1719908853.165:1305): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.865955 kernel: audit: type=1300 audit(1719908853.165:1305): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00f376120 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:27:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00f376120 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:27:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:27:34.058262 kernel: audit: type=1327 audit(1719908853.165:1305): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:27:34.058294 kernel: audit: type=1400 audit(1719908853.165:1306): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c011ea50b0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:27:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:27:33.165000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.165000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011ea50e0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:27:33.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:27:33.166000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.166000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c011bc27c0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:27:33.166000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:27:33.166000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.166000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011a373e0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:27:33.166000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:27:33.166000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:33.166000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0061ba5d0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:27:33.166000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:27:38.705000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:38.734472 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 08:27:38.734536 kernel: audit: type=1400 audit(1719908858.705:1311): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:38.705000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ea60e0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:38.944711 kernel: audit: type=1300 audit(1719908858.705:1311): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ea60e0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:38.944772 kernel: audit: type=1327 audit(1719908858.705:1311): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:38.705000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:39.038149 kernel: audit: type=1400 audit(1719908858.707:1312): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:38.707000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:39.127363 kernel: audit: type=1300 audit(1719908858.707:1312): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020b0360 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:38.707000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020b0360 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:39.247876 kernel: audit: type=1327 audit(1719908858.707:1312): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:38.707000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:39.341103 kernel: audit: type=1400 audit(1719908858.708:1313): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:38.708000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:39.431101 kernel: audit: type=1300 audit(1719908858.708:1313): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027d2a80 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:38.708000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027d2a80 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:39.551643 kernel: audit: type=1327 audit(1719908858.708:1313): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:38.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:39.645083 kernel: audit: type=1400 audit(1719908858.708:1314): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:38.708000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:27:38.708000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ea6100 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:27:38.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:27:39.996000 audit[6185]: AVC avc: denied { watch } for pid=6185 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.3666256278/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c103,c613 tclass=file permissive=0 Jul 2 08:27:39.996000 audit[6185]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001026140 a2=fc6 a3=0 items=0 ppid=5700 pid=6185 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 key=(null) Jul 2 08:27:39.996000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:27:40.392000 audit[6234]: AVC avc: denied { watch } for pid=6234 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.1169416610/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c763 tclass=file permissive=0 Jul 2 08:27:40.392000 audit[6234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019f02c0 a2=fc6 a3=0 items=0 ppid=5749 pid=6234 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 key=(null) Jul 2 08:27:40.392000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:28:33.141000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.170268 kernel: kauditd_printk_skb: 8 callbacks suppressed Jul 2 08:28:33.170332 kernel: audit: type=1400 audit(1719908913.141:1317): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.141000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fa2980 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:33.379193 kernel: audit: type=1300 audit(1719908913.141:1317): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fa2980 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:33.379249 kernel: audit: type=1327 audit(1719908913.141:1317): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:33.141000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:33.471645 kernel: audit: type=1400 audit(1719908913.141:1318): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.141000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.562159 kernel: audit: type=1300 audit(1719908913.141:1318): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003323980 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:33.141000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003323980 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:33.682642 kernel: audit: type=1327 audit(1719908913.141:1318): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:33.141000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:33.166000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.865811 kernel: audit: type=1400 audit(1719908913.166:1319): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.865848 kernel: audit: type=1300 audit(1719908913.166:1319): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0107edbc0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:28:33.166000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0107edbc0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:28:33.964249 kernel: audit: type=1327 audit(1719908913.166:1319): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:28:33.166000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:28:34.057418 kernel: audit: type=1400 audit(1719908913.167:1320): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.167000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.167000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c011436390 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:28:33.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:28:33.167000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.167000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.167000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f82c900 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:28:33.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:28:33.167000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00f1d7410 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:28:33.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:28:33.167000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.167000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00806da70 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:28:33.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:28:33.167000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:33.167000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00f1d7440 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:28:33.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:28:38.707000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:38.749514 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 08:28:38.749609 kernel: audit: type=1400 audit(1719908918.707:1325): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:38.707000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00324cd40 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:38.839639 kernel: audit: type=1300 audit(1719908918.707:1325): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00324cd40 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:38.707000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:39.054126 kernel: audit: type=1327 audit(1719908918.707:1325): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:39.054165 kernel: audit: type=1400 audit(1719908918.710:1326): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:38.710000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:39.143269 kernel: audit: type=1300 audit(1719908918.710:1326): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001292280 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:38.710000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001292280 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:39.263750 kernel: audit: type=1327 audit(1719908918.710:1326): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:38.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:38.710000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:39.446927 kernel: audit: type=1400 audit(1719908918.710:1327): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:39.446985 kernel: audit: type=1300 audit(1719908918.710:1327): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012922c0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:38.710000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012922c0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:39.567492 kernel: audit: type=1327 audit(1719908918.710:1327): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:38.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:39.660720 kernel: audit: type=1400 audit(1719908918.710:1328): avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:38.710000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:28:38.710000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003523a20 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:28:38.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:28:39.998000 audit[6185]: AVC avc: denied { watch } for pid=6185 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.3666256278/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c103,c613 tclass=file permissive=0 Jul 2 08:28:39.998000 audit[6185]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001394fa0 a2=fc6 a3=0 items=0 ppid=5700 pid=6185 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 key=(null) Jul 2 08:28:39.998000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:28:40.394000 audit[6234]: AVC avc: denied { watch } for pid=6234 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.1169416610/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c763 tclass=file permissive=0 Jul 2 08:28:40.394000 audit[6234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b56120 a2=fc6 a3=0 items=0 ppid=5749 pid=6234 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 key=(null) Jul 2 08:28:40.394000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:29:04.861629 systemd[1]: Started sshd@7-147.75.203.89:22-139.178.68.195:34220.service. Jul 2 08:29:04.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.89:22-139.178.68.195:34220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:04.888811 kernel: kauditd_printk_skb: 8 callbacks suppressed Jul 2 08:29:04.888851 kernel: audit: type=1130 audit(1719908944.860:1331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.89:22-139.178.68.195:34220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:05.005000 audit[7183]: USER_ACCT pid=7183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.006826 sshd[7183]: Accepted publickey for core from 139.178.68.195 port 34220 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:05.009923 sshd[7183]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:05.012843 systemd-logind[1554]: New session 10 of user core. Jul 2 08:29:05.014687 systemd[1]: Started session-10.scope. Jul 2 08:29:05.097286 sshd[7183]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:05.008000 audit[7183]: CRED_ACQ pid=7183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.098901 systemd[1]: sshd@7-147.75.203.89:22-139.178.68.195:34220.service: Deactivated successfully. Jul 2 08:29:05.099490 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 08:29:05.099904 systemd-logind[1554]: Session 10 logged out. Waiting for processes to exit. Jul 2 08:29:05.100435 systemd-logind[1554]: Removed session 10. Jul 2 08:29:05.189643 kernel: audit: type=1101 audit(1719908945.005:1332): pid=7183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.189685 kernel: audit: type=1103 audit(1719908945.008:1333): pid=7183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.189704 kernel: audit: type=1006 audit(1719908945.008:1334): pid=7183 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 08:29:05.248370 kernel: audit: type=1300 audit(1719908945.008:1334): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b73b730 a2=3 a3=0 items=0 ppid=1 pid=7183 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:05.008000 audit[7183]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b73b730 a2=3 a3=0 items=0 ppid=1 pid=7183 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:05.340922 kernel: audit: type=1327 audit(1719908945.008:1334): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:05.008000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:05.371749 kernel: audit: type=1105 audit(1719908945.015:1335): pid=7183 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.015000 audit[7183]: USER_START pid=7183 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.467133 kernel: audit: type=1103 audit(1719908945.016:1336): pid=7185 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.016000 audit[7185]: CRED_ACQ pid=7185 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.556334 kernel: audit: type=1106 audit(1719908945.096:1337): pid=7183 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.096000 audit[7183]: USER_END pid=7183 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.096000 audit[7183]: CRED_DISP pid=7183 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.741849 kernel: audit: type=1104 audit(1719908945.096:1338): pid=7183 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:05.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.89:22-139.178.68.195:34220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:10.106439 systemd[1]: Started sshd@8-147.75.203.89:22-139.178.68.195:34234.service. Jul 2 08:29:10.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.89:22-139.178.68.195:34234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:10.133616 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 08:29:10.133689 kernel: audit: type=1130 audit(1719908950.104:1340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.89:22-139.178.68.195:34234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:10.251000 audit[7217]: USER_ACCT pid=7217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.253167 sshd[7217]: Accepted publickey for core from 139.178.68.195 port 34234 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:10.253880 sshd[7217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:10.256485 systemd-logind[1554]: New session 11 of user core. Jul 2 08:29:10.256990 systemd[1]: Started session-11.scope. Jul 2 08:29:10.335532 sshd[7217]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:10.336973 systemd[1]: sshd@8-147.75.203.89:22-139.178.68.195:34234.service: Deactivated successfully. Jul 2 08:29:10.337433 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 08:29:10.337830 systemd-logind[1554]: Session 11 logged out. Waiting for processes to exit. Jul 2 08:29:10.338360 systemd-logind[1554]: Removed session 11. Jul 2 08:29:10.252000 audit[7217]: CRED_ACQ pid=7217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.434913 kernel: audit: type=1101 audit(1719908950.251:1341): pid=7217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.434953 kernel: audit: type=1103 audit(1719908950.252:1342): pid=7217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.434973 kernel: audit: type=1006 audit(1719908950.252:1343): pid=7217 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 2 08:29:10.493246 kernel: audit: type=1300 audit(1719908950.252:1343): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf6a74510 a2=3 a3=0 items=0 ppid=1 pid=7217 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:10.252000 audit[7217]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf6a74510 a2=3 a3=0 items=0 ppid=1 pid=7217 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:10.584875 kernel: audit: type=1327 audit(1719908950.252:1343): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:10.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:10.615354 kernel: audit: type=1105 audit(1719908950.257:1344): pid=7217 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.257000 audit[7217]: USER_START pid=7217 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.709768 kernel: audit: type=1103 audit(1719908950.258:1345): pid=7219 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.258000 audit[7219]: CRED_ACQ pid=7219 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.334000 audit[7217]: USER_END pid=7217 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.894421 kernel: audit: type=1106 audit(1719908950.334:1346): pid=7217 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.894458 kernel: audit: type=1104 audit(1719908950.334:1347): pid=7217 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.334000 audit[7217]: CRED_DISP pid=7217 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:10.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.89:22-139.178.68.195:34234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:15.344614 systemd[1]: Started sshd@9-147.75.203.89:22-139.178.68.195:51762.service. Jul 2 08:29:15.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.89:22-139.178.68.195:51762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:15.371909 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 08:29:15.371991 kernel: audit: type=1130 audit(1719908955.343:1349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.89:22-139.178.68.195:51762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:15.487000 audit[7247]: USER_ACCT pid=7247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.489628 sshd[7247]: Accepted publickey for core from 139.178.68.195 port 51762 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:15.490906 sshd[7247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:15.493304 systemd-logind[1554]: New session 12 of user core. Jul 2 08:29:15.493785 systemd[1]: Started session-12.scope. Jul 2 08:29:15.572330 sshd[7247]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:15.574107 systemd[1]: sshd@9-147.75.203.89:22-139.178.68.195:51762.service: Deactivated successfully. Jul 2 08:29:15.574435 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 08:29:15.574800 systemd-logind[1554]: Session 12 logged out. Waiting for processes to exit. Jul 2 08:29:15.575337 systemd[1]: Started sshd@10-147.75.203.89:22-139.178.68.195:51766.service. Jul 2 08:29:15.575819 systemd-logind[1554]: Removed session 12. Jul 2 08:29:15.489000 audit[7247]: CRED_ACQ pid=7247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.671275 kernel: audit: type=1101 audit(1719908955.487:1350): pid=7247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.671317 kernel: audit: type=1103 audit(1719908955.489:1351): pid=7247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.671336 kernel: audit: type=1006 audit(1719908955.489:1352): pid=7247 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jul 2 08:29:15.729756 kernel: audit: type=1300 audit(1719908955.489:1352): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc992be890 a2=3 a3=0 items=0 ppid=1 pid=7247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:15.489000 audit[7247]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc992be890 a2=3 a3=0 items=0 ppid=1 pid=7247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:15.758904 sshd[7273]: Accepted publickey for core from 139.178.68.195 port 51766 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:15.760190 sshd[7273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:15.762924 systemd-logind[1554]: New session 13 of user core. Jul 2 08:29:15.763375 systemd[1]: Started session-13.scope. Jul 2 08:29:15.489000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:15.852186 kernel: audit: type=1327 audit(1719908955.489:1352): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:15.852260 kernel: audit: type=1105 audit(1719908955.494:1353): pid=7247 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.494000 audit[7247]: USER_START pid=7247 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.857382 sshd[7273]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:15.859314 systemd[1]: sshd@10-147.75.203.89:22-139.178.68.195:51766.service: Deactivated successfully. Jul 2 08:29:15.859702 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 08:29:15.860062 systemd-logind[1554]: Session 13 logged out. Waiting for processes to exit. Jul 2 08:29:15.860713 systemd[1]: Started sshd@11-147.75.203.89:22-139.178.68.195:51774.service. Jul 2 08:29:15.861261 systemd-logind[1554]: Removed session 13. Jul 2 08:29:15.946634 kernel: audit: type=1103 audit(1719908955.494:1354): pid=7249 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.494000 audit[7249]: CRED_ACQ pid=7249 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.571000 audit[7247]: USER_END pid=7247 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.036621 kernel: audit: type=1106 audit(1719908955.571:1355): pid=7247 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.065341 sshd[7296]: Accepted publickey for core from 139.178.68.195 port 51774 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:16.066804 sshd[7296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:16.069245 systemd-logind[1554]: New session 14 of user core. Jul 2 08:29:16.069733 systemd[1]: Started session-14.scope. Jul 2 08:29:15.571000 audit[7247]: CRED_DISP pid=7247 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.146239 sshd[7296]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:16.147666 systemd[1]: sshd@11-147.75.203.89:22-139.178.68.195:51774.service: Deactivated successfully. Jul 2 08:29:16.148103 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 08:29:16.148450 systemd-logind[1554]: Session 14 logged out. Waiting for processes to exit. Jul 2 08:29:16.149108 systemd-logind[1554]: Removed session 14. Jul 2 08:29:16.220580 kernel: audit: type=1104 audit(1719908955.571:1356): pid=7247 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.89:22-139.178.68.195:51762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:15.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.89:22-139.178.68.195:51766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:15.757000 audit[7273]: USER_ACCT pid=7273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.758000 audit[7273]: CRED_ACQ pid=7273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.758000 audit[7273]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe43b1b120 a2=3 a3=0 items=0 ppid=1 pid=7273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:15.758000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:15.764000 audit[7273]: USER_START pid=7273 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.764000 audit[7275]: CRED_ACQ pid=7275 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.856000 audit[7273]: USER_END pid=7273 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.856000 audit[7273]: CRED_DISP pid=7273 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:15.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.89:22-139.178.68.195:51766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:15.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.89:22-139.178.68.195:51774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:16.063000 audit[7296]: USER_ACCT pid=7296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.065000 audit[7296]: CRED_ACQ pid=7296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.065000 audit[7296]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb83d4230 a2=3 a3=0 items=0 ppid=1 pid=7296 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:16.065000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:16.070000 audit[7296]: USER_START pid=7296 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.070000 audit[7298]: CRED_ACQ pid=7298 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.145000 audit[7296]: USER_END pid=7296 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.145000 audit[7296]: CRED_DISP pid=7296 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:16.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.89:22-139.178.68.195:51774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:21.149317 systemd[1]: Started sshd@12-147.75.203.89:22-139.178.68.195:51780.service. Jul 2 08:29:21.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.89:22-139.178.68.195:51780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:21.176364 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 08:29:21.176430 kernel: audit: type=1130 audit(1719908961.147:1376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.89:22-139.178.68.195:51780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:21.301000 audit[7326]: USER_ACCT pid=7326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.302605 sshd[7326]: Accepted publickey for core from 139.178.68.195 port 51780 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:21.304210 sshd[7326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:21.306685 systemd-logind[1554]: New session 15 of user core. Jul 2 08:29:21.307205 systemd[1]: Started session-15.scope. Jul 2 08:29:21.384551 sshd[7326]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:21.386066 systemd[1]: sshd@12-147.75.203.89:22-139.178.68.195:51780.service: Deactivated successfully. Jul 2 08:29:21.386528 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 08:29:21.386959 systemd-logind[1554]: Session 15 logged out. Waiting for processes to exit. Jul 2 08:29:21.387450 systemd-logind[1554]: Removed session 15. Jul 2 08:29:21.303000 audit[7326]: CRED_ACQ pid=7326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.484209 kernel: audit: type=1101 audit(1719908961.301:1377): pid=7326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.484260 kernel: audit: type=1103 audit(1719908961.303:1378): pid=7326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.484277 kernel: audit: type=1006 audit(1719908961.303:1379): pid=7326 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 2 08:29:21.542705 kernel: audit: type=1300 audit(1719908961.303:1379): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc37ec6c80 a2=3 a3=0 items=0 ppid=1 pid=7326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:21.303000 audit[7326]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc37ec6c80 a2=3 a3=0 items=0 ppid=1 pid=7326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:21.634643 kernel: audit: type=1327 audit(1719908961.303:1379): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:21.303000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:21.665081 kernel: audit: type=1105 audit(1719908961.309:1380): pid=7326 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.309000 audit[7326]: USER_START pid=7326 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.759529 kernel: audit: type=1103 audit(1719908961.309:1381): pid=7328 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.309000 audit[7328]: CRED_ACQ pid=7328 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.848646 kernel: audit: type=1106 audit(1719908961.384:1382): pid=7326 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.384000 audit[7326]: USER_END pid=7326 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.944035 kernel: audit: type=1104 audit(1719908961.384:1383): pid=7326 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.384000 audit[7326]: CRED_DISP pid=7326 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:21.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.89:22-139.178.68.195:51780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:26.396223 systemd[1]: Started sshd@13-147.75.203.89:22-139.178.68.195:57418.service. Jul 2 08:29:26.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.89:22-139.178.68.195:57418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:26.423801 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 08:29:26.423898 kernel: audit: type=1130 audit(1719908966.396:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.89:22-139.178.68.195:57418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:26.542000 audit[7360]: USER_ACCT pid=7360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.543509 sshd[7360]: Accepted publickey for core from 139.178.68.195 port 57418 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:26.544891 sshd[7360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:26.547486 systemd-logind[1554]: New session 16 of user core. Jul 2 08:29:26.548005 systemd[1]: Started session-16.scope. Jul 2 08:29:26.624949 sshd[7360]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:26.626277 systemd[1]: sshd@13-147.75.203.89:22-139.178.68.195:57418.service: Deactivated successfully. Jul 2 08:29:26.626737 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 08:29:26.627110 systemd-logind[1554]: Session 16 logged out. Waiting for processes to exit. Jul 2 08:29:26.627538 systemd-logind[1554]: Removed session 16. Jul 2 08:29:26.544000 audit[7360]: CRED_ACQ pid=7360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.725114 kernel: audit: type=1101 audit(1719908966.542:1386): pid=7360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.725360 kernel: audit: type=1103 audit(1719908966.544:1387): pid=7360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.725382 kernel: audit: type=1006 audit(1719908966.544:1388): pid=7360 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 08:29:26.544000 audit[7360]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc406b13b0 a2=3 a3=0 items=0 ppid=1 pid=7360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:26.784625 kernel: audit: type=1300 audit(1719908966.544:1388): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc406b13b0 a2=3 a3=0 items=0 ppid=1 pid=7360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:26.544000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:26.906064 kernel: audit: type=1327 audit(1719908966.544:1388): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:26.906118 kernel: audit: type=1105 audit(1719908966.549:1389): pid=7360 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.549000 audit[7360]: USER_START pid=7360 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.549000 audit[7362]: CRED_ACQ pid=7362 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:27.089647 kernel: audit: type=1103 audit(1719908966.549:1390): pid=7362 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:27.089688 kernel: audit: type=1106 audit(1719908966.624:1391): pid=7360 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.624000 audit[7360]: USER_END pid=7360 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:27.185038 kernel: audit: type=1104 audit(1719908966.625:1392): pid=7360 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.625000 audit[7360]: CRED_DISP pid=7360 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:26.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.89:22-139.178.68.195:57418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:31.628001 systemd[1]: Started sshd@14-147.75.203.89:22-139.178.68.195:57420.service. Jul 2 08:29:31.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.89:22-139.178.68.195:57420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:31.654242 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 08:29:31.654286 kernel: audit: type=1130 audit(1719908971.627:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.89:22-139.178.68.195:57420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:31.780000 audit[7413]: USER_ACCT pid=7413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.781143 sshd[7413]: Accepted publickey for core from 139.178.68.195 port 57420 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:31.782962 sshd[7413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:31.785995 systemd-logind[1554]: New session 17 of user core. Jul 2 08:29:31.786599 systemd[1]: Started session-17.scope. Jul 2 08:29:31.866214 sshd[7413]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:31.867866 systemd[1]: sshd@14-147.75.203.89:22-139.178.68.195:57420.service: Deactivated successfully. Jul 2 08:29:31.868328 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 08:29:31.868810 systemd-logind[1554]: Session 17 logged out. Waiting for processes to exit. Jul 2 08:29:31.869381 systemd-logind[1554]: Removed session 17. Jul 2 08:29:31.782000 audit[7413]: CRED_ACQ pid=7413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.962704 kernel: audit: type=1101 audit(1719908971.780:1395): pid=7413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.962785 kernel: audit: type=1103 audit(1719908971.782:1396): pid=7413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.962809 kernel: audit: type=1006 audit(1719908971.782:1397): pid=7413 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 08:29:32.021300 kernel: audit: type=1300 audit(1719908971.782:1397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5ba88750 a2=3 a3=0 items=0 ppid=1 pid=7413 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:31.782000 audit[7413]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5ba88750 a2=3 a3=0 items=0 ppid=1 pid=7413 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:32.113141 kernel: audit: type=1327 audit(1719908971.782:1397): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:31.782000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:32.143567 kernel: audit: type=1105 audit(1719908971.789:1398): pid=7413 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.789000 audit[7413]: USER_START pid=7413 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:32.237947 kernel: audit: type=1103 audit(1719908971.789:1399): pid=7415 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.789000 audit[7415]: CRED_ACQ pid=7415 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:32.327016 kernel: audit: type=1106 audit(1719908971.866:1400): pid=7413 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.866000 audit[7413]: USER_END pid=7413 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:32.422498 kernel: audit: type=1104 audit(1719908971.866:1401): pid=7413 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.866000 audit[7413]: CRED_DISP pid=7413 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:31.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.89:22-139.178.68.195:57420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:33.142000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:33.142000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006075e0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:29:33.142000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:29:33.142000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:33.142000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003026cc0 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:29:33.142000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:29:33.168000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:33.168000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00f8fe360 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:29:33.168000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:29:33.168000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:33.168000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00ec902a0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:29:33.168000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:29:33.168000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:33.168000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00ee949c0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:29:33.168000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:33.168000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:29:33.168000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c004d95c50 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:29:33.168000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:29:33.168000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:33.168000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0107304c0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:29:33.168000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:29:33.168000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:33.168000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00ee949f0 a2=fc6 a3=0 items=0 ppid=2258 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c709 key=(null) Jul 2 08:29:33.168000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 2 08:29:36.875350 systemd[1]: Started sshd@15-147.75.203.89:22-139.178.68.195:42086.service. Jul 2 08:29:36.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.89:22-139.178.68.195:42086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:36.902568 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 2 08:29:36.902607 kernel: audit: type=1130 audit(1719908976.874:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.89:22-139.178.68.195:42086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:37.021000 audit[7483]: USER_ACCT pid=7483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.022139 sshd[7483]: Accepted publickey for core from 139.178.68.195 port 42086 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:37.023729 sshd[7483]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:37.026258 systemd-logind[1554]: New session 18 of user core. Jul 2 08:29:37.026713 systemd[1]: Started session-18.scope. Jul 2 08:29:37.105413 sshd[7483]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:37.107185 systemd[1]: sshd@15-147.75.203.89:22-139.178.68.195:42086.service: Deactivated successfully. Jul 2 08:29:37.107560 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 08:29:37.108113 systemd-logind[1554]: Session 18 logged out. Waiting for processes to exit. Jul 2 08:29:37.108674 systemd[1]: Started sshd@16-147.75.203.89:22-139.178.68.195:42088.service. Jul 2 08:29:37.109350 systemd-logind[1554]: Removed session 18. Jul 2 08:29:37.022000 audit[7483]: CRED_ACQ pid=7483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.203639 kernel: audit: type=1101 audit(1719908977.021:1412): pid=7483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.203711 kernel: audit: type=1103 audit(1719908977.022:1413): pid=7483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.203732 kernel: audit: type=1006 audit(1719908977.023:1414): pid=7483 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 2 08:29:37.233265 sshd[7510]: Accepted publickey for core from 139.178.68.195 port 42088 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:37.234879 sshd[7510]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:37.237261 systemd-logind[1554]: New session 19 of user core. Jul 2 08:29:37.237716 systemd[1]: Started session-19.scope. Jul 2 08:29:37.023000 audit[7483]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd92572670 a2=3 a3=0 items=0 ppid=1 pid=7483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:37.326962 sshd[7510]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:37.328780 systemd[1]: sshd@16-147.75.203.89:22-139.178.68.195:42088.service: Deactivated successfully. Jul 2 08:29:37.329146 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 08:29:37.329738 systemd-logind[1554]: Session 19 logged out. Waiting for processes to exit. Jul 2 08:29:37.330278 systemd[1]: Started sshd@17-147.75.203.89:22-139.178.68.195:42098.service. Jul 2 08:29:37.330973 systemd-logind[1554]: Removed session 19. Jul 2 08:29:37.354277 kernel: audit: type=1300 audit(1719908977.023:1414): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd92572670 a2=3 a3=0 items=0 ppid=1 pid=7483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:37.354316 kernel: audit: type=1327 audit(1719908977.023:1414): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:37.023000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:37.029000 audit[7483]: USER_START pid=7483 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.413881 sshd[7533]: Accepted publickey for core from 139.178.68.195 port 42098 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:37.414582 sshd[7533]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:37.417129 systemd-logind[1554]: New session 20 of user core. Jul 2 08:29:37.417548 systemd[1]: Started session-20.scope. Jul 2 08:29:37.479053 kernel: audit: type=1105 audit(1719908977.029:1415): pid=7483 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.479160 kernel: audit: type=1103 audit(1719908977.030:1416): pid=7485 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.030000 audit[7485]: CRED_ACQ pid=7485 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.105000 audit[7483]: USER_END pid=7483 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.663534 kernel: audit: type=1106 audit(1719908977.105:1417): pid=7483 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.663606 kernel: audit: type=1104 audit(1719908977.105:1418): pid=7483 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.105000 audit[7483]: CRED_DISP pid=7483 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.89:22-139.178.68.195:42086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:37.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.89:22-139.178.68.195:42088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:37.232000 audit[7510]: USER_ACCT pid=7510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.234000 audit[7510]: CRED_ACQ pid=7510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.234000 audit[7510]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde38c92a0 a2=3 a3=0 items=0 ppid=1 pid=7510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:37.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:37.239000 audit[7510]: USER_START pid=7510 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.240000 audit[7512]: CRED_ACQ pid=7512 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.327000 audit[7510]: USER_END pid=7510 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.327000 audit[7510]: CRED_DISP pid=7510 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.89:22-139.178.68.195:42088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:37.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.89:22-139.178.68.195:42098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:37.413000 audit[7533]: USER_ACCT pid=7533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.413000 audit[7533]: CRED_ACQ pid=7533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.413000 audit[7533]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee49856a0 a2=3 a3=0 items=0 ppid=1 pid=7533 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:37.413000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:37.421000 audit[7533]: USER_START pid=7533 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:37.421000 audit[7535]: CRED_ACQ pid=7535 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.540000 audit[7559]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=7559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:29:38.540000 audit[7559]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe3d7a2310 a2=0 a3=7ffe3d7a22fc items=0 ppid=2865 pid=7559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:38.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:29:38.549379 sshd[7533]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:38.549000 audit[7533]: USER_END pid=7533 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.549000 audit[7533]: CRED_DISP pid=7533 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.552163 systemd[1]: sshd@17-147.75.203.89:22-139.178.68.195:42098.service: Deactivated successfully. Jul 2 08:29:38.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.89:22-139.178.68.195:42098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:38.551000 audit[7559]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=7559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:29:38.551000 audit[7559]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe3d7a2310 a2=0 a3=0 items=0 ppid=2865 pid=7559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:38.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:29:38.552885 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 08:29:38.553350 systemd-logind[1554]: Session 20 logged out. Waiting for processes to exit. Jul 2 08:29:38.554314 systemd[1]: Started sshd@18-147.75.203.89:22-139.178.68.195:42106.service. Jul 2 08:29:38.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.89:22-139.178.68.195:42106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:38.554984 systemd-logind[1554]: Removed session 20. Jul 2 08:29:38.568000 audit[7565]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=7565 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:29:38.568000 audit[7565]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc5c603eb0 a2=0 a3=7ffc5c603e9c items=0 ppid=2865 pid=7565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:38.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:29:38.569000 audit[7565]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=7565 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:29:38.569000 audit[7565]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc5c603eb0 a2=0 a3=0 items=0 ppid=2865 pid=7565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:38.569000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:29:38.593000 audit[7562]: USER_ACCT pid=7562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.594541 sshd[7562]: Accepted publickey for core from 139.178.68.195 port 42106 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:38.594000 audit[7562]: CRED_ACQ pid=7562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.594000 audit[7562]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd923a27a0 a2=3 a3=0 items=0 ppid=1 pid=7562 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:38.594000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:38.595644 sshd[7562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:38.598920 systemd-logind[1554]: New session 21 of user core. Jul 2 08:29:38.599714 systemd[1]: Started session-21.scope. Jul 2 08:29:38.602000 audit[7562]: USER_START pid=7562 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.603000 audit[7568]: CRED_ACQ pid=7568 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.709000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:38.709000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021a7540 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:29:38.709000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:29:38.711000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:38.711000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021a7560 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:29:38.711000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:29:38.711000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:38.711000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f40440 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:29:38.711000 audit[2433]: AVC avc: denied { watch } for pid=2433 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 08:29:38.711000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:29:38.711000 audit[2433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021a7580 a2=fc6 a3=0 items=0 ppid=2286 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c125,c677 key=(null) Jul 2 08:29:38.711000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 08:29:38.794748 sshd[7562]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:38.794000 audit[7562]: USER_END pid=7562 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.795000 audit[7562]: CRED_DISP pid=7562 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.796733 systemd[1]: sshd@18-147.75.203.89:22-139.178.68.195:42106.service: Deactivated successfully. Jul 2 08:29:38.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.89:22-139.178.68.195:42106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:38.797208 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 08:29:38.797730 systemd-logind[1554]: Session 21 logged out. Waiting for processes to exit. Jul 2 08:29:38.798565 systemd[1]: Started sshd@19-147.75.203.89:22-139.178.68.195:42122.service. Jul 2 08:29:38.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.89:22-139.178.68.195:42122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:38.799339 systemd-logind[1554]: Removed session 21. Jul 2 08:29:38.836000 audit[7589]: USER_ACCT pid=7589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.837036 sshd[7589]: Accepted publickey for core from 139.178.68.195 port 42122 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:38.837000 audit[7589]: CRED_ACQ pid=7589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.837000 audit[7589]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc764b1780 a2=3 a3=0 items=0 ppid=1 pid=7589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:38.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:38.838021 sshd[7589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:38.841521 systemd-logind[1554]: New session 22 of user core. Jul 2 08:29:38.842350 systemd[1]: Started session-22.scope. Jul 2 08:29:38.845000 audit[7589]: USER_START pid=7589 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.846000 audit[7591]: CRED_ACQ pid=7591 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.971464 sshd[7589]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:38.971000 audit[7589]: USER_END pid=7589 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.971000 audit[7589]: CRED_DISP pid=7589 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:38.972956 systemd[1]: sshd@19-147.75.203.89:22-139.178.68.195:42122.service: Deactivated successfully. Jul 2 08:29:38.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.89:22-139.178.68.195:42122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:38.973425 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 08:29:38.973840 systemd-logind[1554]: Session 22 logged out. Waiting for processes to exit. Jul 2 08:29:38.974362 systemd-logind[1554]: Removed session 22. Jul 2 08:29:39.999000 audit[6185]: AVC avc: denied { watch } for pid=6185 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.3666256278/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c103,c613 tclass=file permissive=0 Jul 2 08:29:39.999000 audit[6185]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001026020 a2=fc6 a3=0 items=0 ppid=5700 pid=6185 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c103,c613 key=(null) Jul 2 08:29:39.999000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:29:40.395000 audit[6234]: AVC avc: denied { watch } for pid=6234 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_08_23_36.1169416610/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c763 tclass=file permissive=0 Jul 2 08:29:40.395000 audit[6234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0022ce460 a2=fc6 a3=0 items=0 ppid=5749 pid=6234 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c763 key=(null) Jul 2 08:29:40.395000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:29:43.751000 audit[7619]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=7619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:29:43.778536 kernel: kauditd_printk_skb: 75 callbacks suppressed Jul 2 08:29:43.778584 kernel: audit: type=1325 audit(1719908983.751:1466): table=filter:125 family=2 entries=20 op=nft_register_rule pid=7619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:29:43.751000 audit[7619]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffda9c89310 a2=0 a3=7ffda9c892fc items=0 ppid=2865 pid=7619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:43.933461 kernel: audit: type=1300 audit(1719908983.751:1466): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffda9c89310 a2=0 a3=7ffda9c892fc items=0 ppid=2865 pid=7619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:43.933493 kernel: audit: type=1327 audit(1719908983.751:1466): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:29:43.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:29:43.973796 systemd[1]: Started sshd@20-147.75.203.89:22-139.178.68.195:43364.service. Jul 2 08:29:43.991160 kernel: audit: type=1130 audit(1719908983.973:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.89:22-139.178.68.195:43364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:43.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.89:22-139.178.68.195:43364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:43.752000 audit[7619]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=7619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:29:44.109025 sshd[7621]: Accepted publickey for core from 139.178.68.195 port 43364 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:44.109863 sshd[7621]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:44.112297 systemd-logind[1554]: New session 23 of user core. Jul 2 08:29:44.112741 systemd[1]: Started session-23.scope. Jul 2 08:29:43.752000 audit[7619]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffda9c89310 a2=0 a3=7ffda9c892fc items=0 ppid=2865 pid=7619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:44.191094 sshd[7621]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:44.192599 systemd[1]: sshd@20-147.75.203.89:22-139.178.68.195:43364.service: Deactivated successfully. Jul 2 08:29:44.193365 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 08:29:44.194007 systemd-logind[1554]: Session 23 logged out. Waiting for processes to exit. Jul 2 08:29:44.194550 systemd-logind[1554]: Removed session 23. Jul 2 08:29:44.237754 kernel: audit: type=1325 audit(1719908983.752:1468): table=nat:126 family=2 entries=106 op=nft_register_chain pid=7619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:29:44.237788 kernel: audit: type=1300 audit(1719908983.752:1468): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffda9c89310 a2=0 a3=7ffda9c892fc items=0 ppid=2865 pid=7619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:44.237806 kernel: audit: type=1327 audit(1719908983.752:1468): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:29:43.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:29:44.295621 kernel: audit: type=1101 audit(1719908984.108:1469): pid=7621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:44.108000 audit[7621]: USER_ACCT pid=7621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:44.388178 kernel: audit: type=1103 audit(1719908984.109:1470): pid=7621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:44.109000 audit[7621]: CRED_ACQ pid=7621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:44.479583 kernel: audit: type=1006 audit(1719908984.109:1471): pid=7621 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 08:29:44.109000 audit[7621]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8414a390 a2=3 a3=0 items=0 ppid=1 pid=7621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:44.109000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:44.114000 audit[7621]: USER_START pid=7621 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:44.114000 audit[7625]: CRED_ACQ pid=7625 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:44.190000 audit[7621]: USER_END pid=7621 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:44.191000 audit[7621]: CRED_DISP pid=7621 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:44.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.89:22-139.178.68.195:43364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:49.202147 systemd[1]: Started sshd@21-147.75.203.89:22-139.178.68.195:43366.service. Jul 2 08:29:49.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.89:22-139.178.68.195:43366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:49.229882 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 08:29:49.229990 kernel: audit: type=1130 audit(1719908989.201:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.89:22-139.178.68.195:43366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:49.349000 audit[7648]: USER_ACCT pid=7648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.350068 sshd[7648]: Accepted publickey for core from 139.178.68.195 port 43366 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:49.351160 sshd[7648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:49.353885 systemd-logind[1554]: New session 24 of user core. Jul 2 08:29:49.355014 systemd[1]: Started session-24.scope. Jul 2 08:29:49.431760 sshd[7648]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:49.433309 systemd[1]: sshd@21-147.75.203.89:22-139.178.68.195:43366.service: Deactivated successfully. Jul 2 08:29:49.434136 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 08:29:49.434714 systemd-logind[1554]: Session 24 logged out. Waiting for processes to exit. Jul 2 08:29:49.435287 systemd-logind[1554]: Removed session 24. Jul 2 08:29:49.349000 audit[7648]: CRED_ACQ pid=7648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.532959 kernel: audit: type=1101 audit(1719908989.349:1478): pid=7648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.533000 kernel: audit: type=1103 audit(1719908989.349:1479): pid=7648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.533018 kernel: audit: type=1006 audit(1719908989.349:1480): pid=7648 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 08:29:49.592085 kernel: audit: type=1300 audit(1719908989.349:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff48944a10 a2=3 a3=0 items=0 ppid=1 pid=7648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:49.349000 audit[7648]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff48944a10 a2=3 a3=0 items=0 ppid=1 pid=7648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:49.684859 kernel: audit: type=1327 audit(1719908989.349:1480): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:49.349000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:49.715646 kernel: audit: type=1105 audit(1719908989.355:1481): pid=7648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.355000 audit[7648]: USER_START pid=7648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.356000 audit[7650]: CRED_ACQ pid=7650 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.900403 kernel: audit: type=1103 audit(1719908989.356:1482): pid=7650 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.900437 kernel: audit: type=1106 audit(1719908989.430:1483): pid=7648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.430000 audit[7648]: USER_END pid=7648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.996752 kernel: audit: type=1104 audit(1719908989.430:1484): pid=7648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.430000 audit[7648]: CRED_DISP pid=7648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:49.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.89:22-139.178.68.195:43366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:54.443169 systemd[1]: Started sshd@22-147.75.203.89:22-139.178.68.195:41260.service. Jul 2 08:29:54.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.89:22-139.178.68.195:41260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:54.471044 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 08:29:54.471119 kernel: audit: type=1130 audit(1719908994.442:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.89:22-139.178.68.195:41260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:54.589000 audit[7695]: USER_ACCT pid=7695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.591345 sshd[7695]: Accepted publickey for core from 139.178.68.195 port 41260 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:54.594932 sshd[7695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:54.605121 systemd-logind[1554]: New session 25 of user core. Jul 2 08:29:54.608148 systemd[1]: Started session-25.scope. Jul 2 08:29:54.592000 audit[7695]: CRED_ACQ pid=7695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.692252 sshd[7695]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:54.693969 systemd[1]: sshd@22-147.75.203.89:22-139.178.68.195:41260.service: Deactivated successfully. Jul 2 08:29:54.694402 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 08:29:54.694751 systemd-logind[1554]: Session 25 logged out. Waiting for processes to exit. Jul 2 08:29:54.695240 systemd-logind[1554]: Removed session 25. Jul 2 08:29:54.774851 kernel: audit: type=1101 audit(1719908994.589:1487): pid=7695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.774888 kernel: audit: type=1103 audit(1719908994.592:1488): pid=7695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.774906 kernel: audit: type=1006 audit(1719908994.592:1489): pid=7695 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 08:29:54.833456 kernel: audit: type=1300 audit(1719908994.592:1489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb598320 a2=3 a3=0 items=0 ppid=1 pid=7695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:54.592000 audit[7695]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb598320 a2=3 a3=0 items=0 ppid=1 pid=7695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:54.925476 kernel: audit: type=1327 audit(1719908994.592:1489): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:54.592000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:54.955988 kernel: audit: type=1105 audit(1719908994.614:1490): pid=7695 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.614000 audit[7695]: USER_START pid=7695 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:55.050478 kernel: audit: type=1103 audit(1719908994.616:1491): pid=7697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.616000 audit[7697]: CRED_ACQ pid=7697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:55.139842 kernel: audit: type=1106 audit(1719908994.691:1492): pid=7695 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.691000 audit[7695]: USER_END pid=7695 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:55.235362 kernel: audit: type=1104 audit(1719908994.691:1493): pid=7695 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.691000 audit[7695]: CRED_DISP pid=7695 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:54.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.89:22-139.178.68.195:41260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:59.701927 systemd[1]: Started sshd@23-147.75.203.89:22-139.178.68.195:41262.service. Jul 2 08:29:59.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.89:22-139.178.68.195:41262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:59.728901 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 08:29:59.728971 kernel: audit: type=1130 audit(1719908999.700:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.89:22-139.178.68.195:41262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:29:59.854000 audit[7720]: USER_ACCT pid=7720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:59.856443 sshd[7720]: Accepted publickey for core from 139.178.68.195 port 41262 ssh2: RSA SHA256:4N6puFKrvBMrXqGwHM53c9EV3cTC5UljK2kulpsohkY Jul 2 08:29:59.857062 sshd[7720]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:29:59.860088 systemd-logind[1554]: New session 26 of user core. Jul 2 08:29:59.861187 systemd[1]: Started session-26.scope. Jul 2 08:29:59.938667 sshd[7720]: pam_unix(sshd:session): session closed for user core Jul 2 08:29:59.940479 systemd[1]: sshd@23-147.75.203.89:22-139.178.68.195:41262.service: Deactivated successfully. Jul 2 08:29:59.941279 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 08:29:59.941892 systemd-logind[1554]: Session 26 logged out. Waiting for processes to exit. Jul 2 08:29:59.942406 systemd-logind[1554]: Removed session 26. Jul 2 08:29:59.855000 audit[7720]: CRED_ACQ pid=7720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:30:00.038118 kernel: audit: type=1101 audit(1719908999.854:1496): pid=7720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:30:00.038160 kernel: audit: type=1103 audit(1719908999.855:1497): pid=7720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:30:00.038179 kernel: audit: type=1006 audit(1719908999.855:1498): pid=7720 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 08:30:00.096641 kernel: audit: type=1300 audit(1719908999.855:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff93d4e7e0 a2=3 a3=0 items=0 ppid=1 pid=7720 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:29:59.855000 audit[7720]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff93d4e7e0 a2=3 a3=0 items=0 ppid=1 pid=7720 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:30:00.188789 kernel: audit: type=1327 audit(1719908999.855:1498): proctitle=737368643A20636F7265205B707269765D Jul 2 08:29:59.855000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:30:00.219255 kernel: audit: type=1105 audit(1719908999.862:1499): pid=7720 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:59.862000 audit[7720]: USER_START pid=7720 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:30:00.313752 kernel: audit: type=1103 audit(1719908999.863:1500): pid=7722 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:59.863000 audit[7722]: CRED_ACQ pid=7722 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:30:00.402980 kernel: audit: type=1106 audit(1719908999.937:1501): pid=7720 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:59.937000 audit[7720]: USER_END pid=7720 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:30:00.498489 kernel: audit: type=1104 audit(1719908999.937:1502): pid=7720 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:59.937000 audit[7720]: CRED_DISP pid=7720 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 08:29:59.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.89:22-139.178.68.195:41262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'