Jul 2 07:53:11.114950 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:53:11.114996 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:11.115014 kernel: BIOS-provided physical RAM map: Jul 2 07:53:11.115028 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Jul 2 07:53:11.115041 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Jul 2 07:53:11.115055 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Jul 2 07:53:11.115082 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Jul 2 07:53:11.115096 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Jul 2 07:53:11.115110 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Jul 2 07:53:11.115123 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Jul 2 07:53:11.115137 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Jul 2 07:53:11.115150 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Jul 2 07:53:11.115163 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Jul 2 07:53:11.115178 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Jul 2 07:53:11.115199 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Jul 2 07:53:11.115213 kernel: NX (Execute Disable) protection: active Jul 2 07:53:11.115228 kernel: efi: EFI v2.70 by EDK II Jul 2 07:53:11.115243 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd2d2018 Jul 2 07:53:11.115258 kernel: random: crng init done Jul 2 07:53:11.115272 kernel: SMBIOS 2.4 present. Jul 2 07:53:11.115287 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Jul 2 07:53:11.115302 kernel: Hypervisor detected: KVM Jul 2 07:53:11.115321 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:53:11.115336 kernel: kvm-clock: cpu 0, msr 14e192001, primary cpu clock Jul 2 07:53:11.115351 kernel: kvm-clock: using sched offset of 12298614763 cycles Jul 2 07:53:11.115367 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:53:11.115382 kernel: tsc: Detected 2299.998 MHz processor Jul 2 07:53:11.115398 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:53:11.115413 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:53:11.115428 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Jul 2 07:53:11.115444 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:53:11.115459 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Jul 2 07:53:11.115479 kernel: Using GB pages for direct mapping Jul 2 07:53:11.115494 kernel: Secure boot disabled Jul 2 07:53:11.115510 kernel: ACPI: Early table checksum verification disabled Jul 2 07:53:11.115524 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Jul 2 07:53:11.115539 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Jul 2 07:53:11.115554 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Jul 2 07:53:11.115568 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Jul 2 07:53:11.115585 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Jul 2 07:53:11.115612 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Jul 2 07:53:11.115628 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Jul 2 07:53:11.115645 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Jul 2 07:53:11.115662 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Jul 2 07:53:11.115680 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Jul 2 07:53:11.115696 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Jul 2 07:53:11.115717 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Jul 2 07:53:11.115734 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Jul 2 07:53:11.115750 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Jul 2 07:53:11.115767 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Jul 2 07:53:11.115784 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Jul 2 07:53:11.115800 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Jul 2 07:53:11.115817 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Jul 2 07:53:11.115834 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Jul 2 07:53:11.115850 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Jul 2 07:53:11.115871 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:53:11.117037 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:53:11.117072 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 2 07:53:11.117089 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Jul 2 07:53:11.117106 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Jul 2 07:53:11.117122 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Jul 2 07:53:11.117140 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Jul 2 07:53:11.117156 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Jul 2 07:53:11.117173 kernel: Zone ranges: Jul 2 07:53:11.117197 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:53:11.117214 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 07:53:11.117232 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Jul 2 07:53:11.117250 kernel: Movable zone start for each node Jul 2 07:53:11.117268 kernel: Early memory node ranges Jul 2 07:53:11.117287 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Jul 2 07:53:11.117305 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Jul 2 07:53:11.117321 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Jul 2 07:53:11.117337 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Jul 2 07:53:11.117359 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Jul 2 07:53:11.117375 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Jul 2 07:53:11.117392 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:53:11.117408 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Jul 2 07:53:11.117425 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Jul 2 07:53:11.117443 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Jul 2 07:53:11.117461 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Jul 2 07:53:11.117479 kernel: ACPI: PM-Timer IO Port: 0xb008 Jul 2 07:53:11.117497 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:53:11.117519 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:53:11.117538 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:53:11.117554 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:53:11.117570 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:53:11.117587 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:53:11.117603 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:53:11.117619 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:53:11.117635 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Jul 2 07:53:11.117652 kernel: Booting paravirtualized kernel on KVM Jul 2 07:53:11.117682 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:53:11.117700 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:53:11.117718 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:53:11.117736 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:53:11.117754 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:53:11.117772 kernel: kvm-guest: PV spinlocks enabled Jul 2 07:53:11.117790 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:53:11.117807 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932280 Jul 2 07:53:11.117822 kernel: Policy zone: Normal Jul 2 07:53:11.117845 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:11.117861 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:53:11.117893 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jul 2 07:53:11.118326 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:53:11.118356 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:53:11.118375 kernel: Memory: 7516812K/7860584K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 343512K reserved, 0K cma-reserved) Jul 2 07:53:11.118391 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:53:11.118409 kernel: Kernel/User page tables isolation: enabled Jul 2 07:53:11.118433 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:53:11.118449 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:53:11.118464 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:53:11.118482 kernel: rcu: RCU event tracing is enabled. Jul 2 07:53:11.118498 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:53:11.118514 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:53:11.118541 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:53:11.118556 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:53:11.118572 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:53:11.118593 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 07:53:11.121925 kernel: Console: colour dummy device 80x25 Jul 2 07:53:11.121953 kernel: printk: console [ttyS0] enabled Jul 2 07:53:11.121981 kernel: ACPI: Core revision 20210730 Jul 2 07:53:11.121998 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:53:11.122016 kernel: x2apic enabled Jul 2 07:53:11.122033 kernel: Switched APIC routing to physical x2apic. Jul 2 07:53:11.122051 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Jul 2 07:53:11.122075 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Jul 2 07:53:11.122093 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Jul 2 07:53:11.122115 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Jul 2 07:53:11.122133 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Jul 2 07:53:11.122150 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:53:11.122167 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 2 07:53:11.122184 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 2 07:53:11.122202 kernel: Spectre V2 : Mitigation: IBRS Jul 2 07:53:11.122219 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:53:11.122241 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:53:11.122258 kernel: RETBleed: Mitigation: IBRS Jul 2 07:53:11.122275 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:53:11.122292 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Jul 2 07:53:11.122309 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 07:53:11.122326 kernel: MDS: Mitigation: Clear CPU buffers Jul 2 07:53:11.122343 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:53:11.122361 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:53:11.122382 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:53:11.122399 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:53:11.122416 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:53:11.122433 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 07:53:11.122450 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:53:11.122468 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:53:11.122485 kernel: LSM: Security Framework initializing Jul 2 07:53:11.122502 kernel: SELinux: Initializing. Jul 2 07:53:11.122518 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:53:11.122540 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:53:11.122557 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Jul 2 07:53:11.122574 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Jul 2 07:53:11.122592 kernel: signal: max sigframe size: 1776 Jul 2 07:53:11.122609 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:53:11.122626 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:53:11.122642 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:53:11.122659 kernel: x86: Booting SMP configuration: Jul 2 07:53:11.122676 kernel: .... node #0, CPUs: #1 Jul 2 07:53:11.122697 kernel: kvm-clock: cpu 1, msr 14e192041, secondary cpu clock Jul 2 07:53:11.122716 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Jul 2 07:53:11.122734 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:53:11.122751 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:53:11.122768 kernel: smpboot: Max logical packages: 1 Jul 2 07:53:11.122785 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Jul 2 07:53:11.122810 kernel: devtmpfs: initialized Jul 2 07:53:11.122831 kernel: x86/mm: Memory block size: 128MB Jul 2 07:53:11.122848 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Jul 2 07:53:11.122870 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:53:11.122901 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:53:11.122919 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:53:11.122936 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:53:11.122953 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:53:11.122971 kernel: audit: type=2000 audit(1719906790.141:1): state=initialized audit_enabled=0 res=1 Jul 2 07:53:11.122988 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:53:11.123005 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:53:11.123022 kernel: cpuidle: using governor menu Jul 2 07:53:11.123043 kernel: ACPI: bus type PCI registered Jul 2 07:53:11.123067 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:53:11.123082 kernel: dca service started, version 1.12.1 Jul 2 07:53:11.123098 kernel: PCI: Using configuration type 1 for base access Jul 2 07:53:11.123114 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:53:11.123130 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:53:11.123148 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:53:11.123164 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:53:11.123180 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:53:11.123202 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:53:11.123219 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:53:11.123237 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:53:11.123254 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:53:11.123271 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:53:11.123288 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Jul 2 07:53:11.123305 kernel: ACPI: Interpreter enabled Jul 2 07:53:11.123323 kernel: ACPI: PM: (supports S0 S3 S5) Jul 2 07:53:11.123343 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:53:11.123367 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:53:11.123386 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Jul 2 07:53:11.123405 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:53:11.123687 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:53:11.126366 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 07:53:11.126400 kernel: PCI host bridge to bus 0000:00 Jul 2 07:53:11.126612 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:53:11.126799 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:53:11.129058 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:53:11.129274 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Jul 2 07:53:11.129465 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:53:11.129698 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:53:11.129975 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Jul 2 07:53:11.133733 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 07:53:11.133981 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Jul 2 07:53:11.134194 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Jul 2 07:53:11.134399 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Jul 2 07:53:11.134595 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Jul 2 07:53:11.135090 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:53:11.135567 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Jul 2 07:53:11.135789 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Jul 2 07:53:11.136018 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 07:53:11.136215 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Jul 2 07:53:11.136417 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Jul 2 07:53:11.136438 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:53:11.136457 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:53:11.136475 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:53:11.136498 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:53:11.136516 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:53:11.136534 kernel: iommu: Default domain type: Translated Jul 2 07:53:11.136552 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:53:11.136570 kernel: vgaarb: loaded Jul 2 07:53:11.136588 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:53:11.136606 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:53:11.136624 kernel: PTP clock support registered Jul 2 07:53:11.136642 kernel: Registered efivars operations Jul 2 07:53:11.136664 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:53:11.136682 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:53:11.136700 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Jul 2 07:53:11.136717 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Jul 2 07:53:11.136735 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Jul 2 07:53:11.136752 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Jul 2 07:53:11.136769 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:53:11.136787 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:53:11.136805 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:53:11.136825 kernel: pnp: PnP ACPI init Jul 2 07:53:11.136842 kernel: pnp: PnP ACPI: found 7 devices Jul 2 07:53:11.143988 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:53:11.144025 kernel: NET: Registered PF_INET protocol family Jul 2 07:53:11.144044 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:53:11.144061 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jul 2 07:53:11.144078 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:53:11.144096 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:53:11.144114 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 07:53:11.144140 kernel: TCP: Hash tables configured (established 65536 bind 65536) Jul 2 07:53:11.144157 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:53:11.144174 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:53:11.144192 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:53:11.144210 kernel: NET: Registered PF_XDP protocol family Jul 2 07:53:11.144443 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:53:11.144648 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:53:11.144843 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:53:11.145056 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Jul 2 07:53:11.145270 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:53:11.145294 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:53:11.145321 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 07:53:11.145340 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Jul 2 07:53:11.145359 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:53:11.145379 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Jul 2 07:53:11.145398 kernel: clocksource: Switched to clocksource tsc Jul 2 07:53:11.145423 kernel: Initialise system trusted keyrings Jul 2 07:53:11.145442 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Jul 2 07:53:11.145460 kernel: Key type asymmetric registered Jul 2 07:53:11.145477 kernel: Asymmetric key parser 'x509' registered Jul 2 07:53:11.145495 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:53:11.145513 kernel: io scheduler mq-deadline registered Jul 2 07:53:11.145532 kernel: io scheduler kyber registered Jul 2 07:53:11.145549 kernel: io scheduler bfq registered Jul 2 07:53:11.145567 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:53:11.145592 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 07:53:11.145814 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Jul 2 07:53:11.145840 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Jul 2 07:53:11.146097 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Jul 2 07:53:11.146129 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 07:53:11.146346 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Jul 2 07:53:11.146370 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:53:11.146389 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:53:11.146409 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 07:53:11.146432 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Jul 2 07:53:11.146449 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Jul 2 07:53:11.146664 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Jul 2 07:53:11.146690 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:53:11.146708 kernel: i8042: Warning: Keylock active Jul 2 07:53:11.146726 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:53:11.146744 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:53:11.146985 kernel: rtc_cmos 00:00: RTC can wake from S4 Jul 2 07:53:11.147193 kernel: rtc_cmos 00:00: registered as rtc0 Jul 2 07:53:11.147396 kernel: rtc_cmos 00:00: setting system clock to 2024-07-02T07:53:10 UTC (1719906790) Jul 2 07:53:11.147593 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Jul 2 07:53:11.147617 kernel: intel_pstate: CPU model not supported Jul 2 07:53:11.147637 kernel: pstore: Registered efi as persistent store backend Jul 2 07:53:11.147656 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:53:11.147675 kernel: Segment Routing with IPv6 Jul 2 07:53:11.147692 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:53:11.147717 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:53:11.147735 kernel: Key type dns_resolver registered Jul 2 07:53:11.147752 kernel: IPI shorthand broadcast: enabled Jul 2 07:53:11.147771 kernel: sched_clock: Marking stable (707005180, 125570369)->(869448755, -36873206) Jul 2 07:53:11.147789 kernel: registered taskstats version 1 Jul 2 07:53:11.147806 kernel: Loading compiled-in X.509 certificates Jul 2 07:53:11.147824 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:53:11.147841 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:53:11.147860 kernel: Key type .fscrypt registered Jul 2 07:53:11.147898 kernel: Key type fscrypt-provisioning registered Jul 2 07:53:11.147916 kernel: pstore: Using crash dump compression: deflate Jul 2 07:53:11.147934 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:53:11.147952 kernel: ima: No architecture policies found Jul 2 07:53:11.147969 kernel: clk: Disabling unused clocks Jul 2 07:53:11.147986 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:53:11.148004 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:53:11.148022 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:53:11.148048 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:53:11.148065 kernel: Run /init as init process Jul 2 07:53:11.148083 kernel: with arguments: Jul 2 07:53:11.148102 kernel: /init Jul 2 07:53:11.148117 kernel: with environment: Jul 2 07:53:11.148133 kernel: HOME=/ Jul 2 07:53:11.148150 kernel: TERM=linux Jul 2 07:53:11.148167 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:53:11.148190 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:53:11.148218 systemd[1]: Detected virtualization kvm. Jul 2 07:53:11.148238 systemd[1]: Detected architecture x86-64. Jul 2 07:53:11.148257 systemd[1]: Running in initrd. Jul 2 07:53:11.148274 systemd[1]: No hostname configured, using default hostname. Jul 2 07:53:11.148293 systemd[1]: Hostname set to . Jul 2 07:53:11.148320 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:53:11.148340 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:53:11.148363 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:53:11.148381 systemd[1]: Reached target cryptsetup.target. Jul 2 07:53:11.148399 systemd[1]: Reached target paths.target. Jul 2 07:53:11.148419 systemd[1]: Reached target slices.target. Jul 2 07:53:11.148437 systemd[1]: Reached target swap.target. Jul 2 07:53:11.148456 systemd[1]: Reached target timers.target. Jul 2 07:53:11.148476 systemd[1]: Listening on iscsid.socket. Jul 2 07:53:11.148495 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:53:11.148520 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:53:11.148539 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:53:11.148558 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:53:11.148577 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:53:11.148597 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:53:11.148617 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:53:11.148637 systemd[1]: Reached target sockets.target. Jul 2 07:53:11.148656 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:53:11.148676 systemd[1]: Finished network-cleanup.service. Jul 2 07:53:11.148701 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:53:11.148722 systemd[1]: Starting systemd-journald.service... Jul 2 07:53:11.148765 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:53:11.148790 kernel: audit: type=1334 audit(1719906791.091:2): prog-id=6 op=LOAD Jul 2 07:53:11.148811 systemd[1]: Starting systemd-resolved.service... Jul 2 07:53:11.148832 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:53:11.148857 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:53:11.148897 kernel: audit: type=1130 audit(1719906791.108:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.148918 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:53:11.148940 kernel: audit: type=1130 audit(1719906791.116:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.148961 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:53:11.148982 kernel: audit: type=1130 audit(1719906791.128:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.149002 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:53:11.149023 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:53:11.149054 systemd-journald[190]: Journal started Jul 2 07:53:11.149147 systemd-journald[190]: Runtime Journal (/run/log/journal/aa5fa17d1fd8a412f4ee6ea0330572a8) is 8.0M, max 148.8M, 140.8M free. Jul 2 07:53:11.091000 audit: BPF prog-id=6 op=LOAD Jul 2 07:53:11.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.123098 systemd-modules-load[191]: Inserted module 'overlay' Jul 2 07:53:11.164947 systemd[1]: Started systemd-journald.service. Jul 2 07:53:11.165019 kernel: audit: type=1130 audit(1719906791.158:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.181813 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:53:11.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.186901 kernel: audit: type=1130 audit(1719906791.179:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.190870 systemd-resolved[192]: Positive Trust Anchors: Jul 2 07:53:11.190906 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:53:11.190964 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:53:11.198266 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:53:11.210027 kernel: audit: type=1130 audit(1719906791.201:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.200020 systemd-resolved[192]: Defaulting to hostname 'linux'. Jul 2 07:53:11.203352 systemd[1]: Started systemd-resolved.service. Jul 2 07:53:11.220898 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:53:11.224139 systemd[1]: Reached target nss-lookup.target. Jul 2 07:53:11.236996 kernel: audit: type=1130 audit(1719906791.222:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.237040 kernel: Bridge firewalling registered Jul 2 07:53:11.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.229443 systemd-modules-load[191]: Inserted module 'br_netfilter' Jul 2 07:53:11.233616 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:53:11.249943 dracut-cmdline[206]: dracut-dracut-053 Jul 2 07:53:11.254133 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:53:11.266898 kernel: SCSI subsystem initialized Jul 2 07:53:11.284648 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:53:11.284719 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:53:11.284743 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:53:11.292603 systemd-modules-load[191]: Inserted module 'dm_multipath' Jul 2 07:53:11.294265 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:53:11.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.306167 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:53:11.319015 kernel: audit: type=1130 audit(1719906791.303:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.322192 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:53:11.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.349917 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:53:11.369913 kernel: iscsi: registered transport (tcp) Jul 2 07:53:11.397911 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:53:11.397991 kernel: QLogic iSCSI HBA Driver Jul 2 07:53:11.441667 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:53:11.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.443203 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:53:11.499935 kernel: raid6: avx2x4 gen() 18389 MB/s Jul 2 07:53:11.516919 kernel: raid6: avx2x4 xor() 8204 MB/s Jul 2 07:53:11.534943 kernel: raid6: avx2x2 gen() 18292 MB/s Jul 2 07:53:11.551964 kernel: raid6: avx2x2 xor() 18263 MB/s Jul 2 07:53:11.569924 kernel: raid6: avx2x1 gen() 14226 MB/s Jul 2 07:53:11.586917 kernel: raid6: avx2x1 xor() 16183 MB/s Jul 2 07:53:11.604922 kernel: raid6: sse2x4 gen() 11078 MB/s Jul 2 07:53:11.621915 kernel: raid6: sse2x4 xor() 6753 MB/s Jul 2 07:53:11.639920 kernel: raid6: sse2x2 gen() 12096 MB/s Jul 2 07:53:11.656917 kernel: raid6: sse2x2 xor() 7463 MB/s Jul 2 07:53:11.673930 kernel: raid6: sse2x1 gen() 10576 MB/s Jul 2 07:53:11.691619 kernel: raid6: sse2x1 xor() 5176 MB/s Jul 2 07:53:11.691657 kernel: raid6: using algorithm avx2x4 gen() 18389 MB/s Jul 2 07:53:11.691679 kernel: raid6: .... xor() 8204 MB/s, rmw enabled Jul 2 07:53:11.692729 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:53:11.708921 kernel: xor: automatically using best checksumming function avx Jul 2 07:53:11.814927 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:53:11.826541 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:53:11.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.825000 audit: BPF prog-id=7 op=LOAD Jul 2 07:53:11.825000 audit: BPF prog-id=8 op=LOAD Jul 2 07:53:11.828747 systemd[1]: Starting systemd-udevd.service... Jul 2 07:53:11.844588 systemd-udevd[388]: Using default interface naming scheme 'v252'. Jul 2 07:53:11.851805 systemd[1]: Started systemd-udevd.service. Jul 2 07:53:11.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.856161 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:53:11.879843 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Jul 2 07:53:11.920694 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:53:11.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:11.926042 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:53:11.991556 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:53:11.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:12.070905 kernel: scsi host0: Virtio SCSI HBA Jul 2 07:53:12.077965 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Jul 2 07:53:12.084948 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:53:12.183530 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:53:12.183611 kernel: AES CTR mode by8 optimization enabled Jul 2 07:53:12.192489 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Jul 2 07:53:12.192803 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Jul 2 07:53:12.193043 kernel: sd 0:0:1:0: [sda] Write Protect is off Jul 2 07:53:12.193234 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Jul 2 07:53:12.193420 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 07:53:12.205977 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:53:12.206052 kernel: GPT:17805311 != 25165823 Jul 2 07:53:12.206076 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:53:12.206098 kernel: GPT:17805311 != 25165823 Jul 2 07:53:12.206127 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:53:12.206149 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:12.208941 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Jul 2 07:53:12.257903 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (453) Jul 2 07:53:12.271853 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:53:12.285473 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:53:12.289046 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:53:12.300221 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:53:12.305710 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:53:12.307089 systemd[1]: Starting disk-uuid.service... Jul 2 07:53:12.319463 disk-uuid[522]: Primary Header is updated. Jul 2 07:53:12.319463 disk-uuid[522]: Secondary Entries is updated. Jul 2 07:53:12.319463 disk-uuid[522]: Secondary Header is updated. Jul 2 07:53:12.331911 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:12.349905 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:12.369906 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:13.363595 disk-uuid[523]: The operation has completed successfully. Jul 2 07:53:13.366036 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:53:13.422081 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:53:13.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.422225 systemd[1]: Finished disk-uuid.service. Jul 2 07:53:13.438592 systemd[1]: Starting verity-setup.service... Jul 2 07:53:13.465903 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:53:13.541836 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:53:13.544342 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:53:13.557479 systemd[1]: Finished verity-setup.service. Jul 2 07:53:13.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.647903 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:53:13.648666 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:53:13.656230 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:53:13.709153 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:13.709200 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:13.709222 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:13.709250 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:53:13.657198 systemd[1]: Starting ignition-setup.service... Jul 2 07:53:13.672038 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:53:13.739902 systemd[1]: Finished ignition-setup.service. Jul 2 07:53:13.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.750125 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:53:13.783374 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:53:13.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.796000 audit: BPF prog-id=9 op=LOAD Jul 2 07:53:13.799284 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:13.833083 systemd-networkd[697]: lo: Link UP Jul 2 07:53:13.833575 systemd-networkd[697]: lo: Gained carrier Jul 2 07:53:13.834433 systemd-networkd[697]: Enumeration completed Jul 2 07:53:13.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.834593 systemd[1]: Started systemd-networkd.service. Jul 2 07:53:13.835282 systemd-networkd[697]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:53:13.837940 systemd-networkd[697]: eth0: Link UP Jul 2 07:53:13.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.837949 systemd-networkd[697]: eth0: Gained carrier Jul 2 07:53:13.925017 iscsid[706]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:53:13.925017 iscsid[706]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:53:13.925017 iscsid[706]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:53:13.925017 iscsid[706]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:53:13.925017 iscsid[706]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:53:13.925017 iscsid[706]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:53:13.925017 iscsid[706]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:53:13.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.849006 systemd-networkd[697]: eth0: DHCPv4 address 10.128.0.108/32, gateway 10.128.0.1 acquired from 169.254.169.254 Jul 2 07:53:14.016478 ignition[667]: Ignition 2.14.0 Jul 2 07:53:14.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.856259 systemd[1]: Reached target network.target. Jul 2 07:53:14.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.016492 ignition[667]: Stage: fetch-offline Jul 2 07:53:13.872297 systemd[1]: Starting iscsiuio.service... Jul 2 07:53:14.016573 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:13.886171 systemd[1]: Started iscsiuio.service. Jul 2 07:53:14.016616 ignition[667]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:53:13.905742 systemd[1]: Starting iscsid.service... Jul 2 07:53:14.037646 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:53:14.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:13.918333 systemd[1]: Started iscsid.service. Jul 2 07:53:14.037846 ignition[667]: parsed url from cmdline: "" Jul 2 07:53:13.933895 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:53:14.037852 ignition[667]: no config URL provided Jul 2 07:53:13.991453 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:53:14.037859 ignition[667]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:53:14.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.022229 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:53:14.037870 ignition[667]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:53:14.031031 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:53:14.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.037904 ignition[667]: failed to fetch config: resource requires networking Jul 2 07:53:14.040130 systemd[1]: Reached target remote-fs.target. Jul 2 07:53:14.038265 ignition[667]: Ignition finished successfully Jul 2 07:53:14.053194 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:53:14.123258 ignition[722]: Ignition 2.14.0 Jul 2 07:53:14.076420 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:53:14.123268 ignition[722]: Stage: fetch Jul 2 07:53:14.096313 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:53:14.123394 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:14.111222 systemd[1]: Starting ignition-fetch.service... Jul 2 07:53:14.123423 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:53:14.143864 unknown[722]: fetched base config from "system" Jul 2 07:53:14.130453 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:53:14.143999 unknown[722]: fetched base config from "system" Jul 2 07:53:14.130640 ignition[722]: parsed url from cmdline: "" Jul 2 07:53:14.144020 unknown[722]: fetched user config from "gcp" Jul 2 07:53:14.130648 ignition[722]: no config URL provided Jul 2 07:53:14.155497 systemd[1]: Finished ignition-fetch.service. Jul 2 07:53:14.130657 ignition[722]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:53:14.171300 systemd[1]: Starting ignition-kargs.service... Jul 2 07:53:14.130668 ignition[722]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:53:14.203453 systemd[1]: Finished ignition-kargs.service. Jul 2 07:53:14.130701 ignition[722]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Jul 2 07:53:14.225343 systemd[1]: Starting ignition-disks.service... Jul 2 07:53:14.137499 ignition[722]: GET result: OK Jul 2 07:53:14.250386 systemd[1]: Finished ignition-disks.service. Jul 2 07:53:14.137606 ignition[722]: parsing config with SHA512: 5b69ed135a057f9953b5e2fa111ee255e1ada6256051132547091b1e25d83cc7f501cb4ee9d69312ae9b4d725b72022ba59a6880620b228e1985e925497f7452 Jul 2 07:53:14.258329 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:53:14.144841 ignition[722]: fetch: fetch complete Jul 2 07:53:14.281151 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:53:14.144852 ignition[722]: fetch: fetch passed Jul 2 07:53:14.305119 systemd[1]: Reached target local-fs.target. Jul 2 07:53:14.144996 ignition[722]: Ignition finished successfully Jul 2 07:53:14.326112 systemd[1]: Reached target sysinit.target. Jul 2 07:53:14.183942 ignition[728]: Ignition 2.14.0 Jul 2 07:53:14.332142 systemd[1]: Reached target basic.target. Jul 2 07:53:14.183951 ignition[728]: Stage: kargs Jul 2 07:53:14.347842 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:53:14.184074 ignition[728]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:14.184105 ignition[728]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:53:14.191153 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:53:14.192478 ignition[728]: kargs: kargs passed Jul 2 07:53:14.192524 ignition[728]: Ignition finished successfully Jul 2 07:53:14.236518 ignition[734]: Ignition 2.14.0 Jul 2 07:53:14.236528 ignition[734]: Stage: disks Jul 2 07:53:14.236666 ignition[734]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:14.236697 ignition[734]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:53:14.244279 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:53:14.245703 ignition[734]: disks: disks passed Jul 2 07:53:14.245757 ignition[734]: Ignition finished successfully Jul 2 07:53:14.382823 systemd-fsck[742]: ROOT: clean, 614/1628000 files, 124057/1617920 blocks Jul 2 07:53:14.590898 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:53:14.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.600132 systemd[1]: Mounting sysroot.mount... Jul 2 07:53:14.630144 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:53:14.625394 systemd[1]: Mounted sysroot.mount. Jul 2 07:53:14.637239 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:53:14.657262 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:53:14.661682 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 07:53:14.661734 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:53:14.661765 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:53:14.750028 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (748) Jul 2 07:53:14.750059 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:14.750075 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:14.750089 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:14.673399 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:53:14.763055 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:53:14.703408 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:53:14.778087 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:53:14.787217 initrd-setup-root[771]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:53:14.797015 initrd-setup-root[779]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:53:14.808046 initrd-setup-root[787]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:53:14.818044 initrd-setup-root[795]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:53:14.837636 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:53:14.869133 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:53:14.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.870497 systemd[1]: Starting ignition-mount.service... Jul 2 07:53:14.892033 systemd[1]: Starting sysroot-boot.service... Jul 2 07:53:14.906551 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:14.906705 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:14.930377 ignition[814]: INFO : Ignition 2.14.0 Jul 2 07:53:14.930377 ignition[814]: INFO : Stage: mount Jul 2 07:53:14.930377 ignition[814]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:14.930377 ignition[814]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:53:15.010410 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (823) Jul 2 07:53:15.010464 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:53:15.010486 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:53:14.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:14.931057 systemd[1]: Finished sysroot-boot.service. Jul 2 07:53:15.040062 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:53:15.040111 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:53:15.040394 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:53:15.040394 ignition[814]: INFO : mount: mount passed Jul 2 07:53:15.040394 ignition[814]: INFO : Ignition finished successfully Jul 2 07:53:14.939448 systemd[1]: Finished ignition-mount.service. Jul 2 07:53:14.953390 systemd[1]: Starting ignition-files.service... Jul 2 07:53:14.980782 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:53:15.108292 ignition[842]: INFO : Ignition 2.14.0 Jul 2 07:53:15.108292 ignition[842]: INFO : Stage: files Jul 2 07:53:15.108292 ignition[842]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:15.108292 ignition[842]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:53:15.108292 ignition[842]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:53:15.108292 ignition[842]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:53:15.108292 ignition[842]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:53:15.108292 ignition[842]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:53:15.108292 ignition[842]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:53:15.108292 ignition[842]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:53:15.108292 ignition[842]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:53:15.108292 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Jul 2 07:53:15.108292 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:53:15.108292 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem696837179" Jul 2 07:53:15.108292 ignition[842]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem696837179": device or resource busy Jul 2 07:53:15.108292 ignition[842]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem696837179", trying btrfs: device or resource busy Jul 2 07:53:15.108292 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem696837179" Jul 2 07:53:15.108292 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem696837179" Jul 2 07:53:15.355026 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (842) Jul 2 07:53:15.036399 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem696837179" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem696837179" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3464907663" Jul 2 07:53:15.364066 ignition[842]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3464907663": device or resource busy Jul 2 07:53:15.364066 ignition[842]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3464907663", trying btrfs: device or resource busy Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3464907663" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3464907663" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem3464907663" Jul 2 07:53:15.364066 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem3464907663" Jul 2 07:53:15.085423 unknown[842]: wrote ssh authorized keys file for user: core Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Jul 2 07:53:15.632033 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1412069583" Jul 2 07:53:15.875055 ignition[842]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1412069583": device or resource busy Jul 2 07:53:15.875055 ignition[842]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1412069583", trying btrfs: device or resource busy Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1412069583" Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1412069583" Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem1412069583" Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem1412069583" Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem372783851" Jul 2 07:53:15.875055 ignition[842]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem372783851": device or resource busy Jul 2 07:53:15.875055 ignition[842]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem372783851", trying btrfs: device or resource busy Jul 2 07:53:15.875055 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem372783851" Jul 2 07:53:15.832059 systemd-networkd[697]: eth0: Gained IPv6LL Jul 2 07:53:16.129017 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem372783851" Jul 2 07:53:16.129017 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem372783851" Jul 2 07:53:16.129017 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem372783851" Jul 2 07:53:16.129017 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Jul 2 07:53:16.129017 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:53:16.129017 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.28.7-x86-64.raw: attempt #1 Jul 2 07:53:18.761406 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Jul 2 07:53:19.237376 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1c): [started] processing unit "oem-gce.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Jul 2 07:53:19.256189 ignition[842]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 07:53:19.726041 kernel: kauditd_printk_skb: 27 callbacks suppressed Jul 2 07:53:19.726088 kernel: audit: type=1130 audit(1719906799.278:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.726113 kernel: audit: type=1130 audit(1719906799.388:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.726137 kernel: audit: type=1130 audit(1719906799.421:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.726158 kernel: audit: type=1131 audit(1719906799.421:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.726183 kernel: audit: type=1130 audit(1719906799.540:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.726198 kernel: audit: type=1131 audit(1719906799.540:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.726212 kernel: audit: type=1130 audit(1719906799.668:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.272965 systemd[1]: Finished ignition-files.service. Jul 2 07:53:19.741082 ignition[842]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:53:19.741082 ignition[842]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:53:19.741082 ignition[842]: INFO : files: files passed Jul 2 07:53:19.741082 ignition[842]: INFO : Ignition finished successfully Jul 2 07:53:19.829066 kernel: audit: type=1131 audit(1719906799.798:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.289476 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:53:19.343164 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:53:19.870078 initrd-setup-root-after-ignition[865]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:53:19.344307 systemd[1]: Starting ignition-quench.service... Jul 2 07:53:19.354561 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:53:19.390651 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:53:19.390790 systemd[1]: Finished ignition-quench.service. Jul 2 07:53:19.423435 systemd[1]: Reached target ignition-complete.target. Jul 2 07:53:19.486236 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:53:19.529398 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:53:19.529510 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:53:19.542447 systemd[1]: Reached target initrd-fs.target. Jul 2 07:53:19.620173 systemd[1]: Reached target initrd.target. Jul 2 07:53:20.057073 kernel: audit: type=1131 audit(1719906800.028:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.633275 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:53:19.634561 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:53:20.110054 kernel: audit: type=1131 audit(1719906800.074:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.652489 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:53:20.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.671560 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:53:20.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.717141 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:53:20.150042 ignition[880]: INFO : Ignition 2.14.0 Jul 2 07:53:20.150042 ignition[880]: INFO : Stage: umount Jul 2 07:53:20.150042 ignition[880]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:53:20.150042 ignition[880]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:53:19.734300 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:53:20.213194 iscsid[706]: iscsid shutting down. Jul 2 07:53:20.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.234132 ignition[880]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:53:20.234132 ignition[880]: INFO : umount: umount passed Jul 2 07:53:20.234132 ignition[880]: INFO : Ignition finished successfully Jul 2 07:53:20.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.749360 systemd[1]: Stopped target timers.target. Jul 2 07:53:20.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.771374 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:53:20.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.771573 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:53:20.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.800643 systemd[1]: Stopped target initrd.target. Jul 2 07:53:20.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.836357 systemd[1]: Stopped target basic.target. Jul 2 07:53:20.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.853341 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:53:19.878349 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:53:19.900291 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:53:19.915283 systemd[1]: Stopped target remote-fs.target. Jul 2 07:53:19.931299 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:53:19.947369 systemd[1]: Stopped target sysinit.target. Jul 2 07:53:20.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.962332 systemd[1]: Stopped target local-fs.target. Jul 2 07:53:20.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.978285 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:53:19.994318 systemd[1]: Stopped target swap.target. Jul 2 07:53:20.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.003323 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:53:20.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.003526 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:53:20.030569 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:53:20.065276 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:53:20.065473 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:53:20.076520 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:53:20.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.076789 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:53:20.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.585000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:53:20.120465 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:53:20.120647 systemd[1]: Stopped ignition-files.service. Jul 2 07:53:20.136741 systemd[1]: Stopping ignition-mount.service... Jul 2 07:53:20.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.166350 systemd[1]: Stopping iscsid.service... Jul 2 07:53:20.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.174393 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:53:20.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.189210 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:53:20.189517 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:53:20.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.227543 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:53:20.227741 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:53:20.246162 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:53:20.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.247398 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:53:20.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.247521 systemd[1]: Stopped iscsid.service. Jul 2 07:53:20.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.254018 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:53:20.254140 systemd[1]: Stopped ignition-mount.service. Jul 2 07:53:20.266769 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:53:20.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.266905 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:53:20.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.287761 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:53:20.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.287942 systemd[1]: Stopped ignition-disks.service. Jul 2 07:53:20.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.302119 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:53:20.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:20.302202 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:53:20.319103 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:53:20.319180 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:53:20.334106 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:53:20.334183 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:53:20.349111 systemd[1]: Stopped target paths.target. Jul 2 07:53:20.959028 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Jul 2 07:53:20.363039 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:53:20.366995 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:53:20.379024 systemd[1]: Stopped target slices.target. Jul 2 07:53:20.393020 systemd[1]: Stopped target sockets.target. Jul 2 07:53:20.407088 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:53:20.407168 systemd[1]: Closed iscsid.socket. Jul 2 07:53:20.421074 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:53:20.421165 systemd[1]: Stopped ignition-setup.service. Jul 2 07:53:20.437126 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:53:20.437207 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:53:20.452279 systemd[1]: Stopping iscsiuio.service... Jul 2 07:53:20.466436 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:53:20.466563 systemd[1]: Stopped iscsiuio.service. Jul 2 07:53:20.480393 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:53:20.480526 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:53:20.496116 systemd[1]: Stopped target network.target. Jul 2 07:53:20.511158 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:53:20.511219 systemd[1]: Closed iscsiuio.socket. Jul 2 07:53:20.526361 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:53:20.529975 systemd-networkd[697]: eth0: DHCPv6 lease lost Jul 2 07:53:20.533373 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:53:20.554506 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:53:20.554644 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:53:20.561979 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:53:20.562115 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:53:20.587964 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:53:20.588028 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:53:20.604179 systemd[1]: Stopping network-cleanup.service... Jul 2 07:53:20.618039 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:53:20.618167 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:53:20.634191 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:53:20.634293 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:53:20.649314 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:53:20.649390 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:53:20.664338 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:53:20.679668 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:53:20.680346 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:53:20.680509 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:53:20.697659 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:53:20.697895 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:53:20.713165 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:53:20.713217 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:53:20.731162 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:53:20.731246 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:53:20.746220 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:53:20.746291 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:53:20.762214 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:53:20.762287 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:53:20.779227 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:53:20.804068 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 07:53:20.804211 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 07:53:20.819328 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:53:20.819394 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:53:20.835214 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:53:20.835293 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:53:20.851654 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 07:53:20.852348 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:53:20.852461 systemd[1]: Stopped network-cleanup.service. Jul 2 07:53:20.866452 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:53:20.866564 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:53:20.881420 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:53:20.898059 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:53:20.921037 systemd[1]: Switching root. Jul 2 07:53:20.961676 systemd-journald[190]: Journal stopped Jul 2 07:53:25.523224 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:53:25.523337 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:53:25.523370 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:53:25.523394 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:53:25.523419 kernel: SELinux: policy capability open_perms=1 Jul 2 07:53:25.523443 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:53:25.523477 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:53:25.523501 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:53:25.523525 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:53:25.523548 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:53:25.523572 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:53:25.523599 systemd[1]: Successfully loaded SELinux policy in 110.310ms. Jul 2 07:53:25.523646 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.470ms. Jul 2 07:53:25.523674 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:53:25.523700 systemd[1]: Detected virtualization kvm. Jul 2 07:53:25.523738 systemd[1]: Detected architecture x86-64. Jul 2 07:53:25.523763 systemd[1]: Detected first boot. Jul 2 07:53:25.523806 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:53:25.523837 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:53:25.523861 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:53:25.523915 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:25.523943 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:25.523974 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:25.524011 kernel: kauditd_printk_skb: 49 callbacks suppressed Jul 2 07:53:25.524036 kernel: audit: type=1334 audit(1719906804.642:90): prog-id=12 op=LOAD Jul 2 07:53:25.524059 kernel: audit: type=1334 audit(1719906804.642:91): prog-id=3 op=UNLOAD Jul 2 07:53:25.524082 kernel: audit: type=1334 audit(1719906804.642:92): prog-id=13 op=LOAD Jul 2 07:53:25.524105 kernel: audit: type=1334 audit(1719906804.642:93): prog-id=14 op=LOAD Jul 2 07:53:25.524132 kernel: audit: type=1334 audit(1719906804.642:94): prog-id=4 op=UNLOAD Jul 2 07:53:25.524156 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:53:25.524185 kernel: audit: type=1334 audit(1719906804.642:95): prog-id=5 op=UNLOAD Jul 2 07:53:25.524208 kernel: audit: type=1334 audit(1719906804.642:96): prog-id=15 op=LOAD Jul 2 07:53:25.524232 kernel: audit: type=1334 audit(1719906804.642:97): prog-id=12 op=UNLOAD Jul 2 07:53:25.524256 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:53:25.524282 kernel: audit: type=1334 audit(1719906804.643:98): prog-id=16 op=LOAD Jul 2 07:53:25.524305 kernel: audit: type=1334 audit(1719906804.643:99): prog-id=17 op=LOAD Jul 2 07:53:25.524329 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:53:25.524355 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:53:25.524381 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:53:25.524537 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 07:53:25.524571 systemd[1]: Created slice system-getty.slice. Jul 2 07:53:25.524595 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:53:25.524618 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:53:25.524642 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:53:25.524666 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:53:25.524691 systemd[1]: Created slice user.slice. Jul 2 07:53:25.524714 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:53:25.524743 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:53:25.524767 systemd[1]: Set up automount boot.automount. Jul 2 07:53:25.524793 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:53:25.524826 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:53:25.524851 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:53:25.524895 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:53:25.524926 systemd[1]: Reached target integritysetup.target. Jul 2 07:53:25.524950 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:53:25.524975 systemd[1]: Reached target remote-fs.target. Jul 2 07:53:25.525005 systemd[1]: Reached target slices.target. Jul 2 07:53:25.525031 systemd[1]: Reached target swap.target. Jul 2 07:53:25.525059 systemd[1]: Reached target torcx.target. Jul 2 07:53:25.525084 systemd[1]: Reached target veritysetup.target. Jul 2 07:53:25.525111 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:53:25.525136 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:53:25.525162 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:53:25.525185 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:53:25.525209 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:53:25.525232 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:53:25.525260 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:53:25.525283 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:53:25.525306 systemd[1]: Mounting media.mount... Jul 2 07:53:25.525329 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:25.525355 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:53:25.525378 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:53:25.525407 systemd[1]: Mounting tmp.mount... Jul 2 07:53:25.525431 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:53:25.525457 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:25.525481 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:53:25.525504 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:53:25.525527 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:25.525549 systemd[1]: Starting modprobe@drm.service... Jul 2 07:53:25.525572 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:25.525596 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:53:25.525619 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:25.525641 kernel: fuse: init (API version 7.34) Jul 2 07:53:25.525666 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:53:25.525693 kernel: loop: module loaded Jul 2 07:53:25.525717 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:53:25.525738 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:53:25.525762 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:53:25.525785 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:53:25.525934 systemd[1]: Stopped systemd-journald.service. Jul 2 07:53:25.525962 systemd[1]: Starting systemd-journald.service... Jul 2 07:53:25.525987 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:53:25.526011 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:53:25.526046 systemd-journald[1004]: Journal started Jul 2 07:53:25.526133 systemd-journald[1004]: Runtime Journal (/run/log/journal/aa5fa17d1fd8a412f4ee6ea0330572a8) is 8.0M, max 148.8M, 140.8M free. Jul 2 07:53:20.960000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:53:21.240000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:53:21.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:21.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:53:21.387000 audit: BPF prog-id=10 op=LOAD Jul 2 07:53:21.387000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:53:21.388000 audit: BPF prog-id=11 op=LOAD Jul 2 07:53:21.388000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:53:21.534000 audit[913]: AVC avc: denied { associate } for pid=913 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:53:21.534000 audit[913]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=896 pid=913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:21.534000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:53:21.544000 audit[913]: AVC avc: denied { associate } for pid=913 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:53:21.544000 audit[913]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=896 pid=913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:21.544000 audit: CWD cwd="/" Jul 2 07:53:21.544000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:21.544000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:21.544000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:53:24.642000 audit: BPF prog-id=12 op=LOAD Jul 2 07:53:24.642000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:53:24.642000 audit: BPF prog-id=13 op=LOAD Jul 2 07:53:24.642000 audit: BPF prog-id=14 op=LOAD Jul 2 07:53:24.642000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:53:24.642000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:53:24.642000 audit: BPF prog-id=15 op=LOAD Jul 2 07:53:24.642000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:53:24.643000 audit: BPF prog-id=16 op=LOAD Jul 2 07:53:24.643000 audit: BPF prog-id=17 op=LOAD Jul 2 07:53:24.643000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:53:24.643000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:53:24.644000 audit: BPF prog-id=18 op=LOAD Jul 2 07:53:24.644000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:53:24.657000 audit: BPF prog-id=19 op=LOAD Jul 2 07:53:24.664000 audit: BPF prog-id=20 op=LOAD Jul 2 07:53:24.664000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:53:24.664000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:53:24.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.732000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:53:24.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:24.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.478000 audit: BPF prog-id=21 op=LOAD Jul 2 07:53:25.478000 audit: BPF prog-id=22 op=LOAD Jul 2 07:53:25.478000 audit: BPF prog-id=23 op=LOAD Jul 2 07:53:25.478000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:53:25.478000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:53:25.518000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:53:25.518000 audit[1004]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd36c32f70 a2=4000 a3=7ffd36c3300c items=0 ppid=1 pid=1004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:25.518000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:53:24.641344 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:53:21.530383 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:24.666113 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:53:21.531551 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:53:21.531586 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:53:21.531637 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:53:21.531656 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:53:21.531713 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:53:21.531738 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:53:21.532090 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:53:21.532177 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:53:21.532205 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:53:21.534782 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:53:21.534850 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:53:21.534900 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:53:21.534932 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:53:21.534966 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:53:21.534993 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:53:24.034923 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:24Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:24.035236 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:24Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:24.035369 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:24Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:24.035595 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:24Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:24.035651 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:24Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:53:24.035721 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-07-02T07:53:24Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:53:25.536985 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:53:25.551919 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:53:25.567698 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:53:25.567788 systemd[1]: Stopped verity-setup.service. Jul 2 07:53:25.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.591900 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:25.600928 systemd[1]: Started systemd-journald.service. Jul 2 07:53:25.610323 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:53:25.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.617230 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:53:25.625201 systemd[1]: Mounted media.mount. Jul 2 07:53:25.632187 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:53:25.641222 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:53:25.650191 systemd[1]: Mounted tmp.mount. Jul 2 07:53:25.658335 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:53:25.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.667392 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:53:25.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.676381 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:53:25.676602 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:53:25.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.685400 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:25.685610 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:25.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.694386 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:53:25.694591 systemd[1]: Finished modprobe@drm.service. Jul 2 07:53:25.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.703369 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:25.703571 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:25.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.713381 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:53:25.713579 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:53:25.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.723396 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:25.723602 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:25.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.732450 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:53:25.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.741463 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:53:25.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.750517 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:53:25.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.759441 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:53:25.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.768786 systemd[1]: Reached target network-pre.target. Jul 2 07:53:25.778556 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:53:25.788458 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:53:25.796038 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:53:25.799225 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:53:25.810090 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:53:25.819056 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:25.820775 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:53:25.823416 systemd-journald[1004]: Time spent on flushing to /var/log/journal/aa5fa17d1fd8a412f4ee6ea0330572a8 is 65.826ms for 1159 entries. Jul 2 07:53:25.823416 systemd-journald[1004]: System Journal (/var/log/journal/aa5fa17d1fd8a412f4ee6ea0330572a8) is 8.0M, max 584.8M, 576.8M free. Jul 2 07:53:25.937286 systemd-journald[1004]: Received client request to flush runtime journal. Jul 2 07:53:25.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.836146 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:25.838582 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:53:25.847698 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:53:25.944119 udevadm[1018]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 07:53:25.857721 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:53:25.868296 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:53:25.877187 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:53:25.886426 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:53:25.895447 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:53:25.908582 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:53:25.922696 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:53:25.933008 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:53:25.943611 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:53:25.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:25.996290 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:53:26.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.523387 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:53:26.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.531000 audit: BPF prog-id=24 op=LOAD Jul 2 07:53:26.531000 audit: BPF prog-id=25 op=LOAD Jul 2 07:53:26.531000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:53:26.531000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:53:26.534022 systemd[1]: Starting systemd-udevd.service... Jul 2 07:53:26.557185 systemd-udevd[1023]: Using default interface naming scheme 'v252'. Jul 2 07:53:26.602815 systemd[1]: Started systemd-udevd.service. Jul 2 07:53:26.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.611000 audit: BPF prog-id=26 op=LOAD Jul 2 07:53:26.614719 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:26.629000 audit: BPF prog-id=27 op=LOAD Jul 2 07:53:26.629000 audit: BPF prog-id=28 op=LOAD Jul 2 07:53:26.630000 audit: BPF prog-id=29 op=LOAD Jul 2 07:53:26.632950 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:53:26.680114 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:53:26.701368 systemd[1]: Started systemd-userdbd.service. Jul 2 07:53:26.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.794934 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:53:26.827132 systemd-networkd[1034]: lo: Link UP Jul 2 07:53:26.827147 systemd-networkd[1034]: lo: Gained carrier Jul 2 07:53:26.828537 systemd-networkd[1034]: Enumeration completed Jul 2 07:53:26.828727 systemd-networkd[1034]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:53:26.828734 systemd[1]: Started systemd-networkd.service. Jul 2 07:53:26.830743 systemd-networkd[1034]: eth0: Link UP Jul 2 07:53:26.830934 systemd-networkd[1034]: eth0: Gained carrier Jul 2 07:53:26.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:26.842114 systemd-networkd[1034]: eth0: DHCPv4 address 10.128.0.108/32, gateway 10.128.0.1 acquired from 169.254.169.254 Jul 2 07:53:26.870905 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:53:26.907952 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Jul 2 07:53:26.919928 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1049) Jul 2 07:53:26.901000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:53:26.901000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56481f8baac0 a1=3207c a2=7f7a7d7f3bc5 a3=5 items=108 ppid=1023 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:26.901000 audit: CWD cwd="/" Jul 2 07:53:26.901000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=1 name=(null) inode=13049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=2 name=(null) inode=13049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=3 name=(null) inode=13050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=4 name=(null) inode=13049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=5 name=(null) inode=13051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=6 name=(null) inode=13049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=7 name=(null) inode=13052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.949929 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Jul 2 07:53:26.950246 kernel: ACPI: button: Sleep Button [SLPF] Jul 2 07:53:26.901000 audit: PATH item=8 name=(null) inode=13052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=9 name=(null) inode=13053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=10 name=(null) inode=13052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=11 name=(null) inode=13054 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=12 name=(null) inode=13052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=13 name=(null) inode=13055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=14 name=(null) inode=13052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=15 name=(null) inode=13056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=16 name=(null) inode=13052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=17 name=(null) inode=13057 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=18 name=(null) inode=13049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=19 name=(null) inode=13058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=20 name=(null) inode=13058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=21 name=(null) inode=13059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=22 name=(null) inode=13058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=23 name=(null) inode=13060 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=24 name=(null) inode=13058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=25 name=(null) inode=13061 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=26 name=(null) inode=13058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=27 name=(null) inode=13062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=28 name=(null) inode=13058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=29 name=(null) inode=13063 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=30 name=(null) inode=13049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=31 name=(null) inode=13064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=32 name=(null) inode=13064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=33 name=(null) inode=13065 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=34 name=(null) inode=13064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=35 name=(null) inode=13066 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=36 name=(null) inode=13064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=37 name=(null) inode=13067 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=38 name=(null) inode=13064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=39 name=(null) inode=13068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=40 name=(null) inode=13064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=41 name=(null) inode=13069 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=42 name=(null) inode=13049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=43 name=(null) inode=13070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=44 name=(null) inode=13070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=45 name=(null) inode=13071 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=46 name=(null) inode=13070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=47 name=(null) inode=13072 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=48 name=(null) inode=13070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=49 name=(null) inode=13073 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=50 name=(null) inode=13070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=51 name=(null) inode=13074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=52 name=(null) inode=13070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=53 name=(null) inode=13075 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=55 name=(null) inode=13076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=56 name=(null) inode=13076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=57 name=(null) inode=13077 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=58 name=(null) inode=13076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=59 name=(null) inode=13078 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=60 name=(null) inode=13076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=61 name=(null) inode=13079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=62 name=(null) inode=13079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=63 name=(null) inode=13080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=64 name=(null) inode=13079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=65 name=(null) inode=13081 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=66 name=(null) inode=13079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=67 name=(null) inode=13082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=68 name=(null) inode=13079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=69 name=(null) inode=13083 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=70 name=(null) inode=13079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=71 name=(null) inode=13084 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=72 name=(null) inode=13076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=73 name=(null) inode=13085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=74 name=(null) inode=13085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=75 name=(null) inode=13086 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=76 name=(null) inode=13085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=77 name=(null) inode=13087 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=78 name=(null) inode=13085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=79 name=(null) inode=13088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=80 name=(null) inode=13085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=81 name=(null) inode=13089 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=82 name=(null) inode=13085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=83 name=(null) inode=13090 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=84 name=(null) inode=13076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=85 name=(null) inode=13091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=86 name=(null) inode=13091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=87 name=(null) inode=13092 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=88 name=(null) inode=13091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=89 name=(null) inode=13093 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=90 name=(null) inode=13091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=91 name=(null) inode=13094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=92 name=(null) inode=13091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=93 name=(null) inode=13095 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.962914 kernel: EDAC MC: Ver: 3.0.0 Jul 2 07:53:26.901000 audit: PATH item=94 name=(null) inode=13091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=95 name=(null) inode=13096 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=96 name=(null) inode=13076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=97 name=(null) inode=13097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=98 name=(null) inode=13097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=99 name=(null) inode=13098 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=100 name=(null) inode=13097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=101 name=(null) inode=13099 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=102 name=(null) inode=13097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=103 name=(null) inode=13100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=104 name=(null) inode=13097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=105 name=(null) inode=13101 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=106 name=(null) inode=13097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PATH item=107 name=(null) inode=13102 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:26.901000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:53:26.990916 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Jul 2 07:53:27.003299 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:53:27.004064 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:53:27.019358 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:53:27.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.029558 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:53:27.057906 lvm[1060]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:53:27.091245 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:53:27.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.100245 systemd[1]: Reached target cryptsetup.target. Jul 2 07:53:27.110476 systemd[1]: Starting lvm2-activation.service... Jul 2 07:53:27.116759 lvm[1061]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:53:27.150255 systemd[1]: Finished lvm2-activation.service. Jul 2 07:53:27.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.159211 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:53:27.168027 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:53:27.168079 systemd[1]: Reached target local-fs.target. Jul 2 07:53:27.177051 systemd[1]: Reached target machines.target. Jul 2 07:53:27.187741 systemd[1]: Starting ldconfig.service... Jul 2 07:53:27.195987 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:27.196081 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:27.197740 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:53:27.207369 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:53:27.219205 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:53:27.221173 systemd[1]: Starting systemd-sysext.service... Jul 2 07:53:27.221897 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1063 (bootctl) Jul 2 07:53:27.224147 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:53:27.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.242793 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:53:27.252006 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:53:27.259685 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:27.259982 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:53:27.283932 kernel: loop0: detected capacity change from 0 to 209816 Jul 2 07:53:27.373068 systemd-fsck[1073]: fsck.fat 4.2 (2021-01-31) Jul 2 07:53:27.373068 systemd-fsck[1073]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 07:53:27.375045 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:53:27.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.386945 systemd[1]: Mounting boot.mount... Jul 2 07:53:27.411974 systemd[1]: Mounted boot.mount. Jul 2 07:53:27.434897 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:53:27.445907 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:53:27.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.486928 kernel: loop1: detected capacity change from 0 to 209816 Jul 2 07:53:27.513387 (sd-sysext)[1080]: Using extensions 'kubernetes'. Jul 2 07:53:27.515555 (sd-sysext)[1080]: Merged extensions into '/usr'. Jul 2 07:53:27.542868 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:27.546358 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:53:27.554279 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:27.556359 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:27.566870 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:27.576300 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:27.583163 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:27.583412 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:27.583586 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:27.589214 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:53:27.596571 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:27.596798 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:27.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.605694 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:27.605921 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:27.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.615328 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:27.615600 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:27.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.624931 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:27.625087 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:27.626661 systemd[1]: Finished systemd-sysext.service. Jul 2 07:53:27.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:27.638314 systemd[1]: Starting ensure-sysext.service... Jul 2 07:53:27.647116 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:53:27.663427 systemd[1]: Reloading. Jul 2 07:53:27.668248 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:53:27.671083 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:53:27.675643 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:53:27.839324 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2024-07-02T07:53:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:27.839378 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2024-07-02T07:53:27Z" level=info msg="torcx already run" Jul 2 07:53:27.856735 ldconfig[1062]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:53:27.988420 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:27.988445 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:28.012421 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:28.085122 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:53:28.088000 audit: BPF prog-id=30 op=LOAD Jul 2 07:53:28.088000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:53:28.088000 audit: BPF prog-id=31 op=LOAD Jul 2 07:53:28.088000 audit: BPF prog-id=32 op=LOAD Jul 2 07:53:28.088000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:53:28.088000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:53:28.091000 audit: BPF prog-id=33 op=LOAD Jul 2 07:53:28.091000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:53:28.091000 audit: BPF prog-id=34 op=LOAD Jul 2 07:53:28.091000 audit: BPF prog-id=35 op=LOAD Jul 2 07:53:28.091000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:53:28.091000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:53:28.092000 audit: BPF prog-id=36 op=LOAD Jul 2 07:53:28.092000 audit: BPF prog-id=37 op=LOAD Jul 2 07:53:28.092000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:53:28.092000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:53:28.093000 audit: BPF prog-id=38 op=LOAD Jul 2 07:53:28.093000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:53:28.099593 systemd[1]: Finished ldconfig.service. Jul 2 07:53:28.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.107530 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:53:28.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.117924 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:53:28.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.132453 systemd[1]: Starting audit-rules.service... Jul 2 07:53:28.143553 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:53:28.154245 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:53:28.166347 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:53:28.174000 audit: BPF prog-id=39 op=LOAD Jul 2 07:53:28.178013 systemd[1]: Starting systemd-resolved.service... Jul 2 07:53:28.184000 audit: BPF prog-id=40 op=LOAD Jul 2 07:53:28.188238 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:53:28.197110 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:53:28.205855 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:53:28.205000 audit[1179]: SYSTEM_BOOT pid=1179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:28.214703 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:53:28.214967 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:53:28.219000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:53:28.219000 audit[1182]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeebefbd10 a2=420 a3=0 items=0 ppid=1152 pid=1182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:28.219000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:53:28.221521 augenrules[1182]: No rules Jul 2 07:53:28.223758 systemd[1]: Finished audit-rules.service. Jul 2 07:53:28.231550 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:53:28.247859 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.253696 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:28.263227 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:28.272752 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:28.282840 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:53:28.291129 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.291432 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:28.293941 systemd[1]: Starting systemd-update-done.service... Jul 2 07:53:28.301036 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:53:28.304007 enable-oslogin[1190]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:53:28.306854 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:53:28.315887 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:28.316099 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:28.325804 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:28.326031 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:28.334792 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:28.335039 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:28.343806 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:53:28.344077 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:53:28.353110 systemd[1]: Finished systemd-update-done.service. Jul 2 07:53:28.366431 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:28.366925 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.370107 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:28.374583 systemd-resolved[1170]: Positive Trust Anchors: Jul 2 07:53:28.374601 systemd-resolved[1170]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:53:28.374666 systemd-resolved[1170]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:53:28.378948 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:28.387123 systemd-resolved[1170]: Defaulting to hostname 'linux'. Jul 2 07:53:28.388169 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:28.397071 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:53:28.403483 enable-oslogin[1195]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:53:28.406081 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.406330 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:28.406565 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:53:28.406713 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:28.408663 systemd[1]: Started systemd-resolved.service. Jul 2 07:53:28.417718 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:28.417979 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:28.426746 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:28.427002 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:28.433645 systemd-timesyncd[1174]: Contacted time server 169.254.169.254:123 (169.254.169.254). Jul 2 07:53:28.433735 systemd-timesyncd[1174]: Initial clock synchronization to Tue 2024-07-02 07:53:28.647946 UTC. Jul 2 07:53:28.435322 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:53:28.444744 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:28.444931 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:28.453594 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:53:28.453841 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:53:28.466336 systemd[1]: Reached target network.target. Jul 2 07:53:28.475170 systemd[1]: Reached target nss-lookup.target. Jul 2 07:53:28.484164 systemd[1]: Reached target time-set.target. Jul 2 07:53:28.493161 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:28.493621 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.495703 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:28.504734 systemd[1]: Starting modprobe@drm.service... Jul 2 07:53:28.514285 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:28.522671 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:28.532014 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:53:28.536280 enable-oslogin[1201]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:53:28.540172 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.540441 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:28.542328 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:53:28.551047 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:53:28.551301 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:28.553853 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:28.554084 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:28.562847 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:53:28.563088 systemd[1]: Finished modprobe@drm.service. Jul 2 07:53:28.572580 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:28.572806 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:28.581554 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:28.581812 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:28.591602 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:53:28.591842 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:53:28.601172 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:28.601332 systemd[1]: Reached target sysinit.target. Jul 2 07:53:28.610172 systemd[1]: Started motdgen.path. Jul 2 07:53:28.617129 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:53:28.627273 systemd[1]: Started logrotate.timer. Jul 2 07:53:28.635229 systemd[1]: Started mdadm.timer. Jul 2 07:53:28.642065 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:53:28.650052 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:53:28.650122 systemd[1]: Reached target paths.target. Jul 2 07:53:28.657051 systemd[1]: Reached target timers.target. Jul 2 07:53:28.664458 systemd[1]: Listening on dbus.socket. Jul 2 07:53:28.672324 systemd[1]: Starting docker.socket... Jul 2 07:53:28.683165 systemd[1]: Listening on sshd.socket. Jul 2 07:53:28.690149 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:28.690239 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.691203 systemd[1]: Finished ensure-sysext.service. Jul 2 07:53:28.700215 systemd[1]: Listening on docker.socket. Jul 2 07:53:28.708060 systemd[1]: Reached target sockets.target. Jul 2 07:53:28.716004 systemd[1]: Reached target basic.target. Jul 2 07:53:28.723071 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.723120 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:53:28.724746 systemd[1]: Starting containerd.service... Jul 2 07:53:28.733378 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 07:53:28.744214 systemd[1]: Starting dbus.service... Jul 2 07:53:28.751826 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:53:28.760691 systemd[1]: Starting extend-filesystems.service... Jul 2 07:53:28.768047 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:53:28.770157 systemd[1]: Starting motdgen.service... Jul 2 07:53:28.778240 jq[1208]: false Jul 2 07:53:28.779318 systemd[1]: Starting prepare-helm.service... Jul 2 07:53:28.788135 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:53:28.797076 systemd[1]: Starting sshd-keygen.service... Jul 2 07:53:28.808457 systemd[1]: Starting systemd-logind.service... Jul 2 07:53:28.815066 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:28.815205 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Jul 2 07:53:28.816030 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:53:28.817528 systemd[1]: Starting update-engine.service... Jul 2 07:53:28.824129 systemd-networkd[1034]: eth0: Gained IPv6LL Jul 2 07:53:28.826927 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:53:28.834374 jq[1229]: true Jul 2 07:53:28.837287 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:53:28.848856 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:53:28.849200 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:53:28.851127 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:53:28.851540 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:53:28.860777 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:53:28.861059 systemd[1]: Finished motdgen.service. Jul 2 07:53:28.871522 systemd[1]: Reached target network-online.target. Jul 2 07:53:28.882090 systemd[1]: Starting kubelet.service... Jul 2 07:53:28.888053 extend-filesystems[1209]: Found loop1 Jul 2 07:53:28.888053 extend-filesystems[1209]: Found sda Jul 2 07:53:28.888053 extend-filesystems[1209]: Found sda1 Jul 2 07:53:28.888053 extend-filesystems[1209]: Found sda2 Jul 2 07:53:28.888053 extend-filesystems[1209]: Found sda3 Jul 2 07:53:28.888053 extend-filesystems[1209]: Found usr Jul 2 07:53:28.888053 extend-filesystems[1209]: Found sda4 Jul 2 07:53:28.888053 extend-filesystems[1209]: Found sda6 Jul 2 07:53:28.888053 extend-filesystems[1209]: Found sda7 Jul 2 07:53:28.888053 extend-filesystems[1209]: Found sda9 Jul 2 07:53:28.963123 tar[1232]: linux-amd64/helm Jul 2 07:53:28.963471 jq[1234]: true Jul 2 07:53:28.963664 extend-filesystems[1209]: Checking size of /dev/sda9 Jul 2 07:53:28.963664 extend-filesystems[1209]: Resized partition /dev/sda9 Jul 2 07:53:29.026125 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Jul 2 07:53:28.890833 systemd[1]: Starting oem-gce.service... Jul 2 07:53:29.026441 extend-filesystems[1248]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 07:53:28.967399 dbus-daemon[1207]: [system] SELinux support is enabled Jul 2 07:53:29.044395 update_engine[1226]: I0702 07:53:29.012661 1226 main.cc:92] Flatcar Update Engine starting Jul 2 07:53:29.044395 update_engine[1226]: I0702 07:53:29.024549 1226 update_check_scheduler.cc:74] Next update check in 7m8s Jul 2 07:53:28.967665 systemd[1]: Started dbus.service. Jul 2 07:53:29.000034 dbus-daemon[1207]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1034 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 07:53:28.990180 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:53:29.018101 dbus-daemon[1207]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 07:53:28.990282 systemd[1]: Reached target system-config.target. Jul 2 07:53:29.045871 mkfs.ext4[1242]: mke2fs 1.46.5 (30-Dec-2021) Jul 2 07:53:29.045871 mkfs.ext4[1242]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Jul 2 07:53:29.045871 mkfs.ext4[1242]: Creating filesystem with 262144 4k blocks and 65536 inodes Jul 2 07:53:29.045871 mkfs.ext4[1242]: Filesystem UUID: 48bb24a0-bf80-4a77-9913-7e081c6e2393 Jul 2 07:53:29.045871 mkfs.ext4[1242]: Superblock backups stored on blocks: Jul 2 07:53:29.045871 mkfs.ext4[1242]: 32768, 98304, 163840, 229376 Jul 2 07:53:29.045871 mkfs.ext4[1242]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:53:29.045871 mkfs.ext4[1242]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:53:29.045871 mkfs.ext4[1242]: Creating journal (8192 blocks): done Jul 2 07:53:29.045871 mkfs.ext4[1242]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:53:29.004140 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:53:29.004192 systemd[1]: Reached target user-config.target. Jul 2 07:53:29.028467 systemd[1]: Starting systemd-hostnamed.service... Jul 2 07:53:29.052053 systemd[1]: Started update-engine.service. Jul 2 07:53:29.063917 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Jul 2 07:53:29.068946 systemd[1]: Started locksmithd.service. Jul 2 07:53:29.108072 umount[1256]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Jul 2 07:53:29.116417 kernel: loop2: detected capacity change from 0 to 2097152 Jul 2 07:53:29.116578 extend-filesystems[1248]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Jul 2 07:53:29.116578 extend-filesystems[1248]: old_desc_blocks = 1, new_desc_blocks = 2 Jul 2 07:53:29.116578 extend-filesystems[1248]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Jul 2 07:53:29.150306 extend-filesystems[1209]: Resized filesystem in /dev/sda9 Jul 2 07:53:29.179487 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:53:29.120583 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:53:29.179691 bash[1271]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:53:29.141205 systemd[1]: Finished extend-filesystems.service. Jul 2 07:53:29.159630 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:53:29.218521 env[1235]: time="2024-07-02T07:53:29.218451216Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:53:29.239285 systemd-logind[1224]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:53:29.239329 systemd-logind[1224]: Watching system buttons on /dev/input/event2 (Sleep Button) Jul 2 07:53:29.239361 systemd-logind[1224]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:53:29.250068 systemd-logind[1224]: New seat seat0. Jul 2 07:53:29.261325 systemd[1]: Started systemd-logind.service. Jul 2 07:53:29.582350 coreos-metadata[1206]: Jul 02 07:53:29.582 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Jul 2 07:53:29.588302 coreos-metadata[1206]: Jul 02 07:53:29.588 INFO Fetch failed with 404: resource not found Jul 2 07:53:29.588474 coreos-metadata[1206]: Jul 02 07:53:29.588 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Jul 2 07:53:29.592377 coreos-metadata[1206]: Jul 02 07:53:29.592 INFO Fetch successful Jul 2 07:53:29.592562 coreos-metadata[1206]: Jul 02 07:53:29.592 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Jul 2 07:53:29.595116 coreos-metadata[1206]: Jul 02 07:53:29.595 INFO Fetch failed with 404: resource not found Jul 2 07:53:29.595268 coreos-metadata[1206]: Jul 02 07:53:29.595 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Jul 2 07:53:29.598850 coreos-metadata[1206]: Jul 02 07:53:29.598 INFO Fetch failed with 404: resource not found Jul 2 07:53:29.599035 coreos-metadata[1206]: Jul 02 07:53:29.598 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Jul 2 07:53:29.600841 coreos-metadata[1206]: Jul 02 07:53:29.600 INFO Fetch successful Jul 2 07:53:29.606315 unknown[1206]: wrote ssh authorized keys file for user: core Jul 2 07:53:29.628814 env[1235]: time="2024-07-02T07:53:29.628708207Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:53:29.629174 env[1235]: time="2024-07-02T07:53:29.629143055Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:29.641979 env[1235]: time="2024-07-02T07:53:29.641902620Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:29.643785 env[1235]: time="2024-07-02T07:53:29.643746175Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:29.644464 env[1235]: time="2024-07-02T07:53:29.644418565Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:29.644628 env[1235]: time="2024-07-02T07:53:29.644603626Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:29.644783 env[1235]: time="2024-07-02T07:53:29.644757356Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:53:29.644932 env[1235]: time="2024-07-02T07:53:29.644903732Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:29.645246 env[1235]: time="2024-07-02T07:53:29.645220645Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:29.645862 env[1235]: time="2024-07-02T07:53:29.645824262Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:29.646364 env[1235]: time="2024-07-02T07:53:29.646313081Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:29.647940 env[1235]: time="2024-07-02T07:53:29.647888339Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:53:29.648213 env[1235]: time="2024-07-02T07:53:29.648184856Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:53:29.649842 env[1235]: time="2024-07-02T07:53:29.649810746Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:53:29.657109 env[1235]: time="2024-07-02T07:53:29.657068147Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:53:29.657224 env[1235]: time="2024-07-02T07:53:29.657124642Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:53:29.657224 env[1235]: time="2024-07-02T07:53:29.657147916Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:53:29.657224 env[1235]: time="2024-07-02T07:53:29.657208398Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.657427 env[1235]: time="2024-07-02T07:53:29.657234168Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.657427 env[1235]: time="2024-07-02T07:53:29.657359460Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.657427 env[1235]: time="2024-07-02T07:53:29.657390804Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.657427 env[1235]: time="2024-07-02T07:53:29.657417602Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.657624 env[1235]: time="2024-07-02T07:53:29.657439296Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.657624 env[1235]: time="2024-07-02T07:53:29.657464931Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.657624 env[1235]: time="2024-07-02T07:53:29.657487966Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.657624 env[1235]: time="2024-07-02T07:53:29.657511653Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:53:29.657865 env[1235]: time="2024-07-02T07:53:29.657650897Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:53:29.657865 env[1235]: time="2024-07-02T07:53:29.657826007Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:53:29.658434 env[1235]: time="2024-07-02T07:53:29.658400099Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:53:29.658552 env[1235]: time="2024-07-02T07:53:29.658451845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658552 env[1235]: time="2024-07-02T07:53:29.658476443Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:53:29.658664 env[1235]: time="2024-07-02T07:53:29.658554751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658664 env[1235]: time="2024-07-02T07:53:29.658581422Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658759 env[1235]: time="2024-07-02T07:53:29.658678502Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658759 env[1235]: time="2024-07-02T07:53:29.658705527Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658759 env[1235]: time="2024-07-02T07:53:29.658727756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658759 env[1235]: time="2024-07-02T07:53:29.658750430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658983 env[1235]: time="2024-07-02T07:53:29.658771202Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658983 env[1235]: time="2024-07-02T07:53:29.658803962Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.658983 env[1235]: time="2024-07-02T07:53:29.658829158Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:53:29.659139 env[1235]: time="2024-07-02T07:53:29.659039083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.659139 env[1235]: time="2024-07-02T07:53:29.659067887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.659139 env[1235]: time="2024-07-02T07:53:29.659090915Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.659139 env[1235]: time="2024-07-02T07:53:29.659112470Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:53:29.659326 env[1235]: time="2024-07-02T07:53:29.659138676Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:53:29.659326 env[1235]: time="2024-07-02T07:53:29.659158500Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:53:29.659326 env[1235]: time="2024-07-02T07:53:29.659189403Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:53:29.659326 env[1235]: time="2024-07-02T07:53:29.659252175Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:53:29.660769 env[1235]: time="2024-07-02T07:53:29.659569131Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:53:29.660769 env[1235]: time="2024-07-02T07:53:29.659682051Z" level=info msg="Connect containerd service" Jul 2 07:53:29.660769 env[1235]: time="2024-07-02T07:53:29.659729987Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:53:29.660769 env[1235]: time="2024-07-02T07:53:29.660684626Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.661275320Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.661350712Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.661661403Z" level=info msg="containerd successfully booted in 0.445421s" Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.661833927Z" level=info msg="Start subscribing containerd event" Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.661921218Z" level=info msg="Start recovering state" Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.662014000Z" level=info msg="Start event monitor" Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.662048783Z" level=info msg="Start snapshots syncer" Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.662064108Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:53:29.664825 env[1235]: time="2024-07-02T07:53:29.662076875Z" level=info msg="Start streaming server" Jul 2 07:53:29.665236 update-ssh-keys[1282]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:53:29.661525 systemd[1]: Started containerd.service. Jul 2 07:53:29.669914 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 07:53:29.672401 dbus-daemon[1207]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 07:53:29.673052 dbus-daemon[1207]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1260 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 07:53:29.678298 systemd[1]: Started systemd-hostnamed.service. Jul 2 07:53:29.692713 systemd[1]: Starting polkit.service... Jul 2 07:53:29.792277 polkitd[1284]: Started polkitd version 121 Jul 2 07:53:29.819812 polkitd[1284]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 07:53:29.821731 polkitd[1284]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 07:53:29.828739 polkitd[1284]: Finished loading, compiling and executing 2 rules Jul 2 07:53:29.829684 systemd[1]: Started polkit.service. Jul 2 07:53:29.829448 dbus-daemon[1207]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 07:53:29.830357 polkitd[1284]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 07:53:29.869470 systemd-hostnamed[1260]: Hostname set to (transient) Jul 2 07:53:29.872477 systemd-resolved[1170]: System hostname changed to 'ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal'. Jul 2 07:53:30.384835 tar[1232]: linux-amd64/LICENSE Jul 2 07:53:30.385372 tar[1232]: linux-amd64/README.md Jul 2 07:53:30.401638 systemd[1]: Finished prepare-helm.service. Jul 2 07:53:30.999469 systemd[1]: Started kubelet.service. Jul 2 07:53:32.248567 locksmithd[1270]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:53:32.550345 kubelet[1298]: E0702 07:53:32.550198 1298 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:53:32.553384 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:53:32.553598 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:53:32.553999 systemd[1]: kubelet.service: Consumed 1.478s CPU time. Jul 2 07:53:32.899537 sshd_keygen[1230]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:53:32.943786 systemd[1]: Finished sshd-keygen.service. Jul 2 07:53:32.954103 systemd[1]: Starting issuegen.service... Jul 2 07:53:32.965739 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:53:32.966037 systemd[1]: Finished issuegen.service. Jul 2 07:53:32.975419 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:53:32.988886 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:53:33.000423 systemd[1]: Started getty@tty1.service. Jul 2 07:53:33.010388 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:53:33.019498 systemd[1]: Reached target getty.target. Jul 2 07:53:35.247184 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Jul 2 07:53:37.257954 kernel: loop2: detected capacity change from 0 to 2097152 Jul 2 07:53:37.274408 systemd-nspawn[1320]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Jul 2 07:53:37.274408 systemd-nspawn[1320]: Press ^] three times within 1s to kill container. Jul 2 07:53:37.288937 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:53:37.372110 systemd[1]: Started oem-gce.service. Jul 2 07:53:37.379525 systemd[1]: Reached target multi-user.target. Jul 2 07:53:37.390271 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:53:37.403936 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:53:37.404266 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:53:37.414394 systemd[1]: Startup finished in 1.006s (kernel) + 10.303s (initrd) + 16.296s (userspace) = 27.606s. Jul 2 07:53:37.427136 systemd-nspawn[1320]: + '[' -e /etc/default/instance_configs.cfg.template ']' Jul 2 07:53:37.427136 systemd-nspawn[1320]: + echo -e '[InstanceSetup]\nset_host_keys = false' Jul 2 07:53:37.427366 systemd-nspawn[1320]: + /usr/bin/google_instance_setup Jul 2 07:53:37.940136 systemd[1]: Created slice system-sshd.slice. Jul 2 07:53:37.942473 systemd[1]: Started sshd@0-10.128.0.108:22-147.75.109.163:43688.service. Jul 2 07:53:38.072190 instance-setup[1326]: INFO Running google_set_multiqueue. Jul 2 07:53:38.085746 instance-setup[1326]: INFO Set channels for eth0 to 2. Jul 2 07:53:38.089555 instance-setup[1326]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Jul 2 07:53:38.091072 instance-setup[1326]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Jul 2 07:53:38.091444 instance-setup[1326]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Jul 2 07:53:38.092749 instance-setup[1326]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Jul 2 07:53:38.093272 instance-setup[1326]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Jul 2 07:53:38.094709 instance-setup[1326]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Jul 2 07:53:38.095066 instance-setup[1326]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Jul 2 07:53:38.096437 instance-setup[1326]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Jul 2 07:53:38.108292 instance-setup[1326]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Jul 2 07:53:38.108464 instance-setup[1326]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Jul 2 07:53:38.150040 systemd-nspawn[1320]: + /usr/bin/google_metadata_script_runner --script-type startup Jul 2 07:53:38.269761 sshd[1330]: Accepted publickey for core from 147.75.109.163 port 43688 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:38.273632 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:38.295282 systemd[1]: Created slice user-500.slice. Jul 2 07:53:38.298830 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:53:38.312641 systemd-logind[1224]: New session 1 of user core. Jul 2 07:53:38.324229 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:53:38.327828 systemd[1]: Starting user@500.service... Jul 2 07:53:38.347501 (systemd)[1362]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:38.517032 systemd[1362]: Queued start job for default target default.target. Jul 2 07:53:38.519031 systemd[1362]: Reached target paths.target. Jul 2 07:53:38.519078 systemd[1362]: Reached target sockets.target. Jul 2 07:53:38.519105 systemd[1362]: Reached target timers.target. Jul 2 07:53:38.519130 systemd[1362]: Reached target basic.target. Jul 2 07:53:38.519320 systemd[1]: Started user@500.service. Jul 2 07:53:38.521092 systemd[1]: Started session-1.scope. Jul 2 07:53:38.523627 systemd[1362]: Reached target default.target. Jul 2 07:53:38.524427 systemd[1362]: Startup finished in 163ms. Jul 2 07:53:38.601329 startup-script[1360]: INFO Starting startup scripts. Jul 2 07:53:38.614465 startup-script[1360]: INFO No startup scripts found in metadata. Jul 2 07:53:38.614664 startup-script[1360]: INFO Finished running startup scripts. Jul 2 07:53:38.649626 systemd-nspawn[1320]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Jul 2 07:53:38.649626 systemd-nspawn[1320]: + daemon_pids=() Jul 2 07:53:38.650350 systemd-nspawn[1320]: + for d in accounts clock_skew network Jul 2 07:53:38.650350 systemd-nspawn[1320]: + daemon_pids+=($!) Jul 2 07:53:38.650350 systemd-nspawn[1320]: + for d in accounts clock_skew network Jul 2 07:53:38.650350 systemd-nspawn[1320]: + daemon_pids+=($!) Jul 2 07:53:38.650350 systemd-nspawn[1320]: + for d in accounts clock_skew network Jul 2 07:53:38.650595 systemd-nspawn[1320]: + daemon_pids+=($!) Jul 2 07:53:38.650692 systemd-nspawn[1320]: + NOTIFY_SOCKET=/run/systemd/notify Jul 2 07:53:38.650692 systemd-nspawn[1320]: + /usr/bin/systemd-notify --ready Jul 2 07:53:38.651141 systemd-nspawn[1320]: + /usr/bin/google_clock_skew_daemon Jul 2 07:53:38.651605 systemd-nspawn[1320]: + /usr/bin/google_network_daemon Jul 2 07:53:38.651848 systemd-nspawn[1320]: + /usr/bin/google_accounts_daemon Jul 2 07:53:38.749089 systemd[1]: Started sshd@1-10.128.0.108:22-147.75.109.163:43704.service. Jul 2 07:53:38.801046 systemd-nspawn[1320]: + wait -n 36 37 38 Jul 2 07:53:39.087547 sshd[1377]: Accepted publickey for core from 147.75.109.163 port 43704 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:39.089111 sshd[1377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:39.098106 systemd[1]: Started session-2.scope. Jul 2 07:53:39.100674 systemd-logind[1224]: New session 2 of user core. Jul 2 07:53:39.310084 sshd[1377]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:39.314346 systemd[1]: sshd@1-10.128.0.108:22-147.75.109.163:43704.service: Deactivated successfully. Jul 2 07:53:39.315548 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:53:39.316561 systemd-logind[1224]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:53:39.318404 systemd-logind[1224]: Removed session 2. Jul 2 07:53:39.354696 systemd[1]: Started sshd@2-10.128.0.108:22-147.75.109.163:43720.service. Jul 2 07:53:39.453361 google-clock-skew[1372]: INFO Starting Google Clock Skew daemon. Jul 2 07:53:39.458041 google-networking[1373]: INFO Starting Google Networking daemon. Jul 2 07:53:39.485251 google-clock-skew[1372]: INFO Clock drift token has changed: 0. Jul 2 07:53:39.490484 systemd-nspawn[1320]: hwclock: Cannot access the Hardware Clock via any known method. Jul 2 07:53:39.490949 systemd-nspawn[1320]: hwclock: Use the --verbose option to see the details of our search for an access method. Jul 2 07:53:39.491908 google-clock-skew[1372]: WARNING Failed to sync system time with hardware clock. Jul 2 07:53:39.573414 groupadd[1394]: group added to /etc/group: name=google-sudoers, GID=1000 Jul 2 07:53:39.577455 groupadd[1394]: group added to /etc/gshadow: name=google-sudoers Jul 2 07:53:39.581403 groupadd[1394]: new group: name=google-sudoers, GID=1000 Jul 2 07:53:39.593813 google-accounts[1371]: INFO Starting Google Accounts daemon. Jul 2 07:53:39.621321 google-accounts[1371]: WARNING OS Login not installed. Jul 2 07:53:39.622777 google-accounts[1371]: INFO Creating a new user account for 0. Jul 2 07:53:39.628728 systemd-nspawn[1320]: useradd: invalid user name '0': use --badname to ignore Jul 2 07:53:39.629434 google-accounts[1371]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Jul 2 07:53:39.662663 sshd[1388]: Accepted publickey for core from 147.75.109.163 port 43720 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:39.664641 sshd[1388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:39.670847 systemd-logind[1224]: New session 3 of user core. Jul 2 07:53:39.671608 systemd[1]: Started session-3.scope. Jul 2 07:53:39.874848 sshd[1388]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:39.879596 systemd[1]: sshd@2-10.128.0.108:22-147.75.109.163:43720.service: Deactivated successfully. Jul 2 07:53:39.880647 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:53:39.881593 systemd-logind[1224]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:53:39.882807 systemd-logind[1224]: Removed session 3. Jul 2 07:53:39.920875 systemd[1]: Started sshd@3-10.128.0.108:22-147.75.109.163:43734.service. Jul 2 07:53:40.210454 sshd[1408]: Accepted publickey for core from 147.75.109.163 port 43734 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:40.212666 sshd[1408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:40.218980 systemd-logind[1224]: New session 4 of user core. Jul 2 07:53:40.219364 systemd[1]: Started session-4.scope. Jul 2 07:53:40.426859 sshd[1408]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:40.430918 systemd[1]: sshd@3-10.128.0.108:22-147.75.109.163:43734.service: Deactivated successfully. Jul 2 07:53:40.432059 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:53:40.432996 systemd-logind[1224]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:53:40.434518 systemd-logind[1224]: Removed session 4. Jul 2 07:53:40.473304 systemd[1]: Started sshd@4-10.128.0.108:22-147.75.109.163:43740.service. Jul 2 07:53:40.763779 sshd[1414]: Accepted publickey for core from 147.75.109.163 port 43740 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:40.765565 sshd[1414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:40.771584 systemd-logind[1224]: New session 5 of user core. Jul 2 07:53:40.772315 systemd[1]: Started session-5.scope. Jul 2 07:53:40.963069 sudo[1417]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:53:40.963543 sudo[1417]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:53:40.973172 dbus-daemon[1207]: \xd0}\u05ca8V: received setenforce notice (enforcing=164894112) Jul 2 07:53:40.975506 sudo[1417]: pam_unix(sudo:session): session closed for user root Jul 2 07:53:41.020446 sshd[1414]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:41.025809 systemd[1]: sshd@4-10.128.0.108:22-147.75.109.163:43740.service: Deactivated successfully. Jul 2 07:53:41.026964 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:53:41.027827 systemd-logind[1224]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:53:41.029215 systemd-logind[1224]: Removed session 5. Jul 2 07:53:41.066394 systemd[1]: Started sshd@5-10.128.0.108:22-147.75.109.163:43748.service. Jul 2 07:53:41.355747 sshd[1421]: Accepted publickey for core from 147.75.109.163 port 43748 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:41.358098 sshd[1421]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:41.364812 systemd[1]: Started session-6.scope. Jul 2 07:53:41.365645 systemd-logind[1224]: New session 6 of user core. Jul 2 07:53:41.535303 sudo[1425]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:53:41.535735 sudo[1425]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:53:41.540162 sudo[1425]: pam_unix(sudo:session): session closed for user root Jul 2 07:53:41.552947 sudo[1424]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:53:41.553366 sudo[1424]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:53:41.566092 systemd[1]: Stopping audit-rules.service... Jul 2 07:53:41.566000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:53:41.569144 auditctl[1428]: No rules Jul 2 07:53:41.569845 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:53:41.570105 systemd[1]: Stopped audit-rules.service. Jul 2 07:53:41.581034 kernel: kauditd_printk_skb: 214 callbacks suppressed Jul 2 07:53:41.581167 kernel: audit: type=1305 audit(1719906821.566:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:53:41.573762 systemd[1]: Starting audit-rules.service... Jul 2 07:53:41.566000 audit[1428]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff42613df0 a2=420 a3=0 items=0 ppid=1 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:41.619083 kernel: audit: type=1300 audit(1719906821.566:199): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff42613df0 a2=420 a3=0 items=0 ppid=1 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:41.619255 kernel: audit: type=1327 audit(1719906821.566:199): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:53:41.566000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:53:41.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.634944 augenrules[1445]: No rules Jul 2 07:53:41.636212 systemd[1]: Finished audit-rules.service. Jul 2 07:53:41.639763 sudo[1424]: pam_unix(sudo:session): session closed for user root Jul 2 07:53:41.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.651926 kernel: audit: type=1131 audit(1719906821.569:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.651984 kernel: audit: type=1130 audit(1719906821.635:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.638000 audit[1424]: USER_END pid=1424 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.699043 kernel: audit: type=1106 audit(1719906821.638:202): pid=1424 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.699514 sshd[1421]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:41.708467 kernel: audit: type=1104 audit(1719906821.639:203): pid=1424 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.639000 audit[1424]: CRED_DISP pid=1424 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.703949 systemd-logind[1224]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:53:41.705140 systemd[1]: sshd@5-10.128.0.108:22-147.75.109.163:43748.service: Deactivated successfully. Jul 2 07:53:41.706197 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:53:41.707709 systemd-logind[1224]: Removed session 6. Jul 2 07:53:41.700000 audit[1421]: USER_END pid=1421 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:41.755972 kernel: audit: type=1106 audit(1719906821.700:204): pid=1421 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:41.756037 kernel: audit: type=1104 audit(1719906821.700:205): pid=1421 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:41.700000 audit[1421]: CRED_DISP pid=1421 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:41.731104 systemd[1]: Started sshd@6-10.128.0.108:22-147.75.109.163:43762.service. Jul 2 07:53:41.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.108:22-147.75.109.163:43748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.804791 kernel: audit: type=1131 audit(1719906821.704:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.108:22-147.75.109.163:43748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:41.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.108:22-147.75.109.163:43762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.040000 audit[1451]: USER_ACCT pid=1451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:42.042346 sshd[1451]: Accepted publickey for core from 147.75.109.163 port 43762 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:42.041000 audit[1451]: CRED_ACQ pid=1451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:42.042000 audit[1451]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0dded540 a2=3 a3=0 items=0 ppid=1 pid=1451 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.042000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:42.043524 sshd[1451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:42.049980 systemd-logind[1224]: New session 7 of user core. Jul 2 07:53:42.050140 systemd[1]: Started session-7.scope. Jul 2 07:53:42.056000 audit[1451]: USER_START pid=1451 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:42.058000 audit[1453]: CRED_ACQ pid=1453 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:42.218000 audit[1454]: USER_ACCT pid=1454 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.219231 sudo[1454]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:53:42.218000 audit[1454]: CRED_REFR pid=1454 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.219676 sudo[1454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:53:42.221000 audit[1454]: USER_START pid=1454 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.251595 systemd[1]: Starting docker.service... Jul 2 07:53:42.303113 env[1464]: time="2024-07-02T07:53:42.302048476Z" level=info msg="Starting up" Jul 2 07:53:42.304153 env[1464]: time="2024-07-02T07:53:42.304100611Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:53:42.304153 env[1464]: time="2024-07-02T07:53:42.304132366Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:53:42.304342 env[1464]: time="2024-07-02T07:53:42.304164220Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:53:42.304342 env[1464]: time="2024-07-02T07:53:42.304182988Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:53:42.306947 env[1464]: time="2024-07-02T07:53:42.306856267Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:53:42.306947 env[1464]: time="2024-07-02T07:53:42.306908562Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:53:42.306947 env[1464]: time="2024-07-02T07:53:42.306936228Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:53:42.307193 env[1464]: time="2024-07-02T07:53:42.306952723Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:53:42.352507 env[1464]: time="2024-07-02T07:53:42.352456119Z" level=info msg="Loading containers: start." Jul 2 07:53:42.438000 audit[1494]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.438000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdf7c18410 a2=0 a3=7ffdf7c183fc items=0 ppid=1464 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:53:42.442000 audit[1496]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.442000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe9dba9b80 a2=0 a3=7ffe9dba9b6c items=0 ppid=1464 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:53:42.445000 audit[1498]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.445000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd32448250 a2=0 a3=7ffd3244823c items=0 ppid=1464 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.445000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:53:42.447000 audit[1500]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.447000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd99fba1f0 a2=0 a3=7ffd99fba1dc items=0 ppid=1464 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.447000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:53:42.451000 audit[1502]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.451000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc532a26a0 a2=0 a3=7ffc532a268c items=0 ppid=1464 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.451000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:53:42.471000 audit[1507]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1507 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.471000 audit[1507]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc35104c80 a2=0 a3=7ffc35104c6c items=0 ppid=1464 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:53:42.483000 audit[1509]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1509 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.483000 audit[1509]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe18cf2df0 a2=0 a3=7ffe18cf2ddc items=0 ppid=1464 pid=1509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.483000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:53:42.486000 audit[1511]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1511 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.486000 audit[1511]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd0e661d90 a2=0 a3=7ffd0e661d7c items=0 ppid=1464 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.486000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:53:42.489000 audit[1513]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1513 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.489000 audit[1513]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffec242c030 a2=0 a3=7ffec242c01c items=0 ppid=1464 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:42.505000 audit[1517]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1517 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.505000 audit[1517]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe93c035a0 a2=0 a3=7ffe93c0358c items=0 ppid=1464 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.505000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:42.506000 audit[1518]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.506000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc52cf8800 a2=0 a3=7ffc52cf87ec items=0 ppid=1464 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.506000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:42.523918 kernel: Initializing XFRM netlink socket Jul 2 07:53:42.569777 env[1464]: time="2024-07-02T07:53:42.569619112Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:53:42.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.591518 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:53:42.591854 systemd[1]: Stopped kubelet.service. Jul 2 07:53:42.591984 systemd[1]: kubelet.service: Consumed 1.478s CPU time. Jul 2 07:53:42.594331 systemd[1]: Starting kubelet.service... Jul 2 07:53:42.606000 audit[1527]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.606000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe8ae05bc0 a2=0 a3=7ffe8ae05bac items=0 ppid=1464 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:53:42.632000 audit[1532]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.632000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffeaebfe690 a2=0 a3=7ffeaebfe67c items=0 ppid=1464 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:53:42.640000 audit[1535]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.640000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe025cdb80 a2=0 a3=7ffe025cdb6c items=0 ppid=1464 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.640000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:53:42.643000 audit[1537]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.643000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc60a32aa0 a2=0 a3=7ffc60a32a8c items=0 ppid=1464 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.643000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:53:42.646000 audit[1539]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.646000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe1644abf0 a2=0 a3=7ffe1644abdc items=0 ppid=1464 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:53:42.649000 audit[1541]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.649000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffce96fc1d0 a2=0 a3=7ffce96fc1bc items=0 ppid=1464 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:53:42.653000 audit[1543]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.653000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffac4c5b50 a2=0 a3=7fffac4c5b3c items=0 ppid=1464 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:53:42.668000 audit[1546]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.668000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdd39221a0 a2=0 a3=7ffdd392218c items=0 ppid=1464 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.668000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:53:42.673000 audit[1549]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.673000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd31b87df0 a2=0 a3=7ffd31b87ddc items=0 ppid=1464 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:53:42.678000 audit[1551]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.678000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffccd083940 a2=0 a3=7ffccd08392c items=0 ppid=1464 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:53:42.682000 audit[1553]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.682000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9db23ea0 a2=0 a3=7ffc9db23e8c items=0 ppid=1464 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.682000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:53:42.684423 systemd-networkd[1034]: docker0: Link UP Jul 2 07:53:42.726000 audit[1557]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.726000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdcd0ca5d0 a2=0 a3=7ffdcd0ca5bc items=0 ppid=1464 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.726000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:42.729000 audit[1558]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:42.729000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffebb19d140 a2=0 a3=7ffebb19d12c items=0 ppid=1464 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:42.729000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:42.730456 env[1464]: time="2024-07-02T07:53:42.730416820Z" level=info msg="Loading containers: done." Jul 2 07:53:42.754147 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2636031219-merged.mount: Deactivated successfully. Jul 2 07:53:42.812077 env[1464]: time="2024-07-02T07:53:42.812007753Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:53:42.812380 env[1464]: time="2024-07-02T07:53:42.812346942Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:53:42.812538 env[1464]: time="2024-07-02T07:53:42.812507666Z" level=info msg="Daemon has completed initialization" Jul 2 07:53:42.838876 systemd[1]: Started kubelet.service. Jul 2 07:53:42.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.897055 systemd[1]: Started docker.service. Jul 2 07:53:42.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:42.905596 env[1464]: time="2024-07-02T07:53:42.905520313Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:53:42.939951 kubelet[1568]: E0702 07:53:42.939557 1568 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:53:42.945525 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:53:42.945763 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:53:42.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:53:44.061116 env[1235]: time="2024-07-02T07:53:44.061055533Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.11\"" Jul 2 07:53:44.689386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2649339345.mount: Deactivated successfully. Jul 2 07:53:46.815888 env[1235]: time="2024-07-02T07:53:46.815794035Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:46.819222 env[1235]: time="2024-07-02T07:53:46.819172586Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b2de212bf8c1b7b0d1b2703356ac7ddcfccaadfcdcd32c1ae914b6078d11e524,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:46.822766 env[1235]: time="2024-07-02T07:53:46.822694957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:46.825399 env[1235]: time="2024-07-02T07:53:46.825347431Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:aec9d1701c304eee8607d728a39baaa511d65bef6dd9861010618f63fbadeb10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:46.826640 env[1235]: time="2024-07-02T07:53:46.826579366Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.11\" returns image reference \"sha256:b2de212bf8c1b7b0d1b2703356ac7ddcfccaadfcdcd32c1ae914b6078d11e524\"" Jul 2 07:53:46.841793 env[1235]: time="2024-07-02T07:53:46.841718085Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.11\"" Jul 2 07:53:49.062517 env[1235]: time="2024-07-02T07:53:49.062441977Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:49.065569 env[1235]: time="2024-07-02T07:53:49.065495052Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:20145ae80ad309fd0c963e2539f6ef0be795ace696539514894b290892c1884b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:49.068699 env[1235]: time="2024-07-02T07:53:49.068649478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:49.071542 env[1235]: time="2024-07-02T07:53:49.071494430Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6014c3572ec683841bbb16f87b94da28ee0254b95e2dba2d1850d62bd0111f09,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:49.072639 env[1235]: time="2024-07-02T07:53:49.072582934Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.11\" returns image reference \"sha256:20145ae80ad309fd0c963e2539f6ef0be795ace696539514894b290892c1884b\"" Jul 2 07:53:49.090335 env[1235]: time="2024-07-02T07:53:49.090284445Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.11\"" Jul 2 07:53:51.541908 env[1235]: time="2024-07-02T07:53:51.541811366Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:51.544852 env[1235]: time="2024-07-02T07:53:51.544803402Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:12c62a5a0745d200eb8333ea6244f6d6328e64c5c3b645a4ade456cc645399b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:51.547870 env[1235]: time="2024-07-02T07:53:51.547810905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:51.551250 env[1235]: time="2024-07-02T07:53:51.551188944Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:46cf7475c8daffb743c856a1aea0ddea35e5acd2418be18b1e22cf98d9c9b445,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:51.552717 env[1235]: time="2024-07-02T07:53:51.552656003Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.11\" returns image reference \"sha256:12c62a5a0745d200eb8333ea6244f6d6328e64c5c3b645a4ade456cc645399b9\"" Jul 2 07:53:51.567907 env[1235]: time="2024-07-02T07:53:51.567833572Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\"" Jul 2 07:53:52.813585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2848093910.mount: Deactivated successfully. Jul 2 07:53:53.224768 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 07:53:53.224961 kernel: audit: type=1130 audit(1719906833.195:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.196849 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 07:53:53.197186 systemd[1]: Stopped kubelet.service. Jul 2 07:53:53.199510 systemd[1]: Starting kubelet.service... Jul 2 07:53:53.256688 kernel: audit: type=1131 audit(1719906833.195:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.392867 systemd[1]: Started kubelet.service. Jul 2 07:53:53.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.415917 kernel: audit: type=1130 audit(1719906833.392:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.491209 kubelet[1626]: E0702 07:53:53.490570 1626 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:53:53.493979 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:53:53.494227 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:53:53.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:53:53.515924 kernel: audit: type=1131 audit(1719906833.493:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:53:54.162973 env[1235]: time="2024-07-02T07:53:54.162897228Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:54.165970 env[1235]: time="2024-07-02T07:53:54.165897687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:54.168151 env[1235]: time="2024-07-02T07:53:54.168105872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:54.170346 env[1235]: time="2024-07-02T07:53:54.170300717Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ae4b671d4cfc23dd75030bb4490207cd939b3b11a799bcb4119698cd712eb5b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:54.171116 env[1235]: time="2024-07-02T07:53:54.171065838Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\" returns image reference \"sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c\"" Jul 2 07:53:54.185117 env[1235]: time="2024-07-02T07:53:54.185067586Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 07:53:54.729870 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4070292827.mount: Deactivated successfully. Jul 2 07:53:54.738203 env[1235]: time="2024-07-02T07:53:54.738139394Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:54.740598 env[1235]: time="2024-07-02T07:53:54.740549067Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:54.742705 env[1235]: time="2024-07-02T07:53:54.742652201Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:54.744787 env[1235]: time="2024-07-02T07:53:54.744745109Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:54.745646 env[1235]: time="2024-07-02T07:53:54.745593696Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 07:53:54.759457 env[1235]: time="2024-07-02T07:53:54.759401142Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Jul 2 07:53:55.219616 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1658885420.mount: Deactivated successfully. Jul 2 07:53:59.111021 env[1235]: time="2024-07-02T07:53:59.110946622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:59.114094 env[1235]: time="2024-07-02T07:53:59.114035049Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:59.117600 env[1235]: time="2024-07-02T07:53:59.117542391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:59.120627 env[1235]: time="2024-07-02T07:53:59.120575543Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:59.121866 env[1235]: time="2024-07-02T07:53:59.121825299Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Jul 2 07:53:59.136358 env[1235]: time="2024-07-02T07:53:59.136305890Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Jul 2 07:53:59.698726 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4023604757.mount: Deactivated successfully. Jul 2 07:53:59.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.925009 kernel: audit: type=1131 audit(1719906839.900:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.902200 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 07:53:59.939000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:53:59.955632 kernel: audit: type=1334 audit(1719906839.939:250): prog-id=46 op=UNLOAD Jul 2 07:53:59.955773 kernel: audit: type=1334 audit(1719906839.939:251): prog-id=45 op=UNLOAD Jul 2 07:53:59.939000 audit: BPF prog-id=45 op=UNLOAD Jul 2 07:53:59.939000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:53:59.963930 kernel: audit: type=1334 audit(1719906839.939:252): prog-id=44 op=UNLOAD Jul 2 07:54:01.281285 env[1235]: time="2024-07-02T07:54:01.281220755Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:01.284263 env[1235]: time="2024-07-02T07:54:01.284214562Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:01.286344 env[1235]: time="2024-07-02T07:54:01.286284730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:01.288570 env[1235]: time="2024-07-02T07:54:01.288509209Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:01.289666 env[1235]: time="2024-07-02T07:54:01.289571485Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Jul 2 07:54:03.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.745488 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 07:54:03.771955 kernel: audit: type=1130 audit(1719906843.744:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.745816 systemd[1]: Stopped kubelet.service. Jul 2 07:54:03.772481 systemd[1]: Starting kubelet.service... Jul 2 07:54:03.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:03.798105 kernel: audit: type=1131 audit(1719906843.745:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.053047 kernel: audit: type=1130 audit(1719906844.029:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:04.030264 systemd[1]: Started kubelet.service. Jul 2 07:54:04.150200 kubelet[1715]: E0702 07:54:04.150133 1715 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:54:04.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:54:04.152682 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:54:04.176010 kernel: audit: type=1131 audit(1719906844.152:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:54:04.152915 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:54:05.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:05.810244 systemd[1]: Stopped kubelet.service. Jul 2 07:54:05.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:05.853295 kernel: audit: type=1130 audit(1719906845.809:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:05.853456 kernel: audit: type=1131 audit(1719906845.810:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:05.854862 systemd[1]: Starting kubelet.service... Jul 2 07:54:05.891461 systemd[1]: Reloading. Jul 2 07:54:06.061805 /usr/lib/systemd/system-generators/torcx-generator[1752]: time="2024-07-02T07:54:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:54:06.063114 /usr/lib/systemd/system-generators/torcx-generator[1752]: time="2024-07-02T07:54:06Z" level=info msg="torcx already run" Jul 2 07:54:06.158213 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:54:06.158239 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:54:06.182816 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.341701 kernel: audit: type=1400 audit(1719906846.299:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.341845 kernel: audit: type=1400 audit(1719906846.299:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.341909 kernel: audit: type=1400 audit(1719906846.299:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.383464 kernel: audit: type=1400 audit(1719906846.299:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.383598 kernel: audit: type=1400 audit(1719906846.299:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.424994 kernel: audit: type=1400 audit(1719906846.299:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.425146 kernel: audit: type=1400 audit(1719906846.299:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.445772 kernel: audit: type=1400 audit(1719906846.299:266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit: BPF prog-id=49 op=LOAD Jul 2 07:54:06.361000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit: BPF prog-id=50 op=LOAD Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.465000 audit: BPF prog-id=51 op=LOAD Jul 2 07:54:06.465000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:54:06.465000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit: BPF prog-id=52 op=LOAD Jul 2 07:54:06.470000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit: BPF prog-id=53 op=LOAD Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.470000 audit: BPF prog-id=54 op=LOAD Jul 2 07:54:06.470000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:54:06.470000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit: BPF prog-id=55 op=LOAD Jul 2 07:54:06.471000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit: BPF prog-id=56 op=LOAD Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit: BPF prog-id=57 op=LOAD Jul 2 07:54:06.472000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:54:06.472000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.473000 audit: BPF prog-id=58 op=LOAD Jul 2 07:54:06.473000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit: BPF prog-id=59 op=LOAD Jul 2 07:54:06.476000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit: BPF prog-id=60 op=LOAD Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.476000 audit: BPF prog-id=61 op=LOAD Jul 2 07:54:06.476000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:54:06.476000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.477000 audit: BPF prog-id=62 op=LOAD Jul 2 07:54:06.477000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.478000 audit: BPF prog-id=63 op=LOAD Jul 2 07:54:06.478000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:54:06.503425 systemd[1]: Started kubelet.service. Jul 2 07:54:06.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.507456 systemd[1]: Stopping kubelet.service... Jul 2 07:54:06.508492 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:54:06.508754 systemd[1]: Stopped kubelet.service. Jul 2 07:54:06.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.511163 systemd[1]: Starting kubelet.service... Jul 2 07:54:06.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:06.707506 systemd[1]: Started kubelet.service. Jul 2 07:54:06.777396 kubelet[1798]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:54:06.777939 kubelet[1798]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:54:06.778072 kubelet[1798]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:54:06.778346 kubelet[1798]: I0702 07:54:06.778301 1798 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:54:07.332202 kubelet[1798]: I0702 07:54:07.332150 1798 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 07:54:07.332202 kubelet[1798]: I0702 07:54:07.332186 1798 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:54:07.332515 kubelet[1798]: I0702 07:54:07.332479 1798 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 07:54:07.367836 kubelet[1798]: E0702 07:54:07.367781 1798 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.108:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.368031 kubelet[1798]: I0702 07:54:07.367964 1798 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:54:07.389434 kubelet[1798]: I0702 07:54:07.389381 1798 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:54:07.392766 kubelet[1798]: I0702 07:54:07.392716 1798 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:54:07.393060 kubelet[1798]: I0702 07:54:07.393007 1798 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:54:07.393060 kubelet[1798]: I0702 07:54:07.393060 1798 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:54:07.393346 kubelet[1798]: I0702 07:54:07.393079 1798 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:54:07.394266 kubelet[1798]: I0702 07:54:07.394224 1798 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:54:07.396230 kubelet[1798]: I0702 07:54:07.396195 1798 kubelet.go:393] "Attempting to sync node with API server" Jul 2 07:54:07.396230 kubelet[1798]: I0702 07:54:07.396231 1798 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:54:07.396417 kubelet[1798]: I0702 07:54:07.396264 1798 kubelet.go:309] "Adding apiserver pod source" Jul 2 07:54:07.396417 kubelet[1798]: I0702 07:54:07.396291 1798 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:54:07.398582 kubelet[1798]: W0702 07:54:07.398405 1798 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.398582 kubelet[1798]: E0702 07:54:07.398553 1798 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.398754 kubelet[1798]: W0702 07:54:07.398691 1798 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.398754 kubelet[1798]: E0702 07:54:07.398748 1798 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.398918 kubelet[1798]: I0702 07:54:07.398897 1798 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:54:07.417893 kubelet[1798]: W0702 07:54:07.417840 1798 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:54:07.418942 kubelet[1798]: I0702 07:54:07.418910 1798 server.go:1232] "Started kubelet" Jul 2 07:54:07.424000 audit[1798]: AVC avc: denied { mac_admin } for pid=1798 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:07.424000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:07.424000 audit[1798]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a09080 a1=c000b9dc50 a2=c000a09050 a3=25 items=0 ppid=1 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.424000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:07.424000 audit[1798]: AVC avc: denied { mac_admin } for pid=1798 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:07.424000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:07.424000 audit[1798]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a9ec60 a1=c000b9dc68 a2=c000a09110 a3=25 items=0 ppid=1 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.424000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:07.427050 kubelet[1798]: I0702 07:54:07.426261 1798 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:54:07.427050 kubelet[1798]: I0702 07:54:07.426327 1798 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:54:07.427050 kubelet[1798]: I0702 07:54:07.426424 1798 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:54:07.428743 kubelet[1798]: E0702 07:54:07.428702 1798 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 07:54:07.428743 kubelet[1798]: E0702 07:54:07.428739 1798 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:54:07.429176 kubelet[1798]: E0702 07:54:07.429055 1798 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal.17de562a4f298c59", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", UID:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 54, 7, 418846297, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 54, 7, 418846297, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal"}': 'Post "https://10.128.0.108:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.108:6443: connect: connection refused'(may retry after sleeping) Jul 2 07:54:07.431182 kubelet[1798]: I0702 07:54:07.431146 1798 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:54:07.432079 kubelet[1798]: I0702 07:54:07.432041 1798 server.go:462] "Adding debug handlers to kubelet server" Jul 2 07:54:07.433227 kubelet[1798]: I0702 07:54:07.433190 1798 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 07:54:07.433456 kubelet[1798]: I0702 07:54:07.433424 1798 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:54:07.435356 kubelet[1798]: I0702 07:54:07.434003 1798 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:54:07.435356 kubelet[1798]: I0702 07:54:07.434131 1798 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:54:07.435356 kubelet[1798]: I0702 07:54:07.434219 1798 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:54:07.435356 kubelet[1798]: W0702 07:54:07.434659 1798 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.435356 kubelet[1798]: E0702 07:54:07.434737 1798 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.438368 kubelet[1798]: E0702 07:54:07.438350 1798 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" not found" Jul 2 07:54:07.438845 kubelet[1798]: E0702 07:54:07.438822 1798 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.108:6443: connect: connection refused" interval="200ms" Jul 2 07:54:07.437000 audit[1808]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:07.437000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffb9da0bf0 a2=0 a3=7fffb9da0bdc items=0 ppid=1798 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:54:07.439000 audit[1809]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:07.439000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdf4e6b60 a2=0 a3=7fffdf4e6b4c items=0 ppid=1798 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:54:07.443000 audit[1811]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:07.443000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc65b89090 a2=0 a3=7ffc65b8907c items=0 ppid=1798 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:54:07.446000 audit[1813]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:07.446000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf342b9b0 a2=0 a3=7ffcf342b99c items=0 ppid=1798 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:54:07.466000 audit[1818]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:07.466000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcc09ca9e0 a2=0 a3=7ffcc09ca9cc items=0 ppid=1798 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:54:07.468801 kubelet[1798]: I0702 07:54:07.468686 1798 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:54:07.469000 audit[1819]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:07.469000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc1c245c0 a2=0 a3=7ffdc1c245ac items=0 ppid=1798 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:54:07.473747 kubelet[1798]: I0702 07:54:07.473702 1798 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:54:07.473945 kubelet[1798]: I0702 07:54:07.473920 1798 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:54:07.474027 kubelet[1798]: I0702 07:54:07.473959 1798 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 07:54:07.474000 audit[1825]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:07.474000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff58d66040 a2=0 a3=7fff58d6602c items=0 ppid=1798 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:54:07.478088 kubelet[1798]: E0702 07:54:07.478063 1798 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:54:07.476000 audit[1822]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:07.476000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc9335e00 a2=0 a3=7ffcc9335dec items=0 ppid=1798 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:54:07.478000 audit[1826]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:07.478000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffe2b86740 a2=0 a3=7fffe2b8672c items=0 ppid=1798 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:54:07.480671 kubelet[1798]: W0702 07:54:07.480638 1798 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.481297 kubelet[1798]: E0702 07:54:07.481277 1798 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:07.479000 audit[1827]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:07.479000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea153cb30 a2=0 a3=7ffea153cb1c items=0 ppid=1798 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:54:07.481000 audit[1828]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:07.481000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcea9c8450 a2=0 a3=7ffcea9c843c items=0 ppid=1798 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:54:07.485185 kubelet[1798]: I0702 07:54:07.485157 1798 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:54:07.485185 kubelet[1798]: I0702 07:54:07.485186 1798 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:54:07.485369 kubelet[1798]: I0702 07:54:07.485209 1798 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:54:07.484000 audit[1829]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:07.484000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffba5fec20 a2=0 a3=7fffba5fec0c items=0 ppid=1798 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:54:07.487981 kubelet[1798]: I0702 07:54:07.487940 1798 policy_none.go:49] "None policy: Start" Jul 2 07:54:07.488775 kubelet[1798]: I0702 07:54:07.488741 1798 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 07:54:07.488775 kubelet[1798]: I0702 07:54:07.488776 1798 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:54:07.499062 systemd[1]: Created slice kubepods.slice. Jul 2 07:54:07.507745 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:54:07.512407 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:54:07.517952 kubelet[1798]: I0702 07:54:07.517919 1798 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:54:07.516000 audit[1798]: AVC avc: denied { mac_admin } for pid=1798 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:07.516000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:07.516000 audit[1798]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f0b620 a1=c000f22b58 a2=c000f0b5f0 a3=25 items=0 ppid=1 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:07.516000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:07.519078 kubelet[1798]: I0702 07:54:07.519058 1798 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:54:07.519465 kubelet[1798]: I0702 07:54:07.519447 1798 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:54:07.523109 kubelet[1798]: E0702 07:54:07.522722 1798 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" not found" Jul 2 07:54:07.546621 kubelet[1798]: I0702 07:54:07.546585 1798 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.547056 kubelet[1798]: E0702 07:54:07.547025 1798 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.108:6443/api/v1/nodes\": dial tcp 10.128.0.108:6443: connect: connection refused" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.580311 kubelet[1798]: I0702 07:54:07.580247 1798 topology_manager.go:215] "Topology Admit Handler" podUID="0769a74e36ef444d26441be684500e70" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.586948 kubelet[1798]: I0702 07:54:07.586493 1798 topology_manager.go:215] "Topology Admit Handler" podUID="e881b34d5754ae52bc53e87d276b91ca" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.594033 kubelet[1798]: I0702 07:54:07.594000 1798 topology_manager.go:215] "Topology Admit Handler" podUID="c7b9900ffd2d6250395d0aa6fd2703bc" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.600354 systemd[1]: Created slice kubepods-burstable-pod0769a74e36ef444d26441be684500e70.slice. Jul 2 07:54:07.615072 systemd[1]: Created slice kubepods-burstable-pode881b34d5754ae52bc53e87d276b91ca.slice. Jul 2 07:54:07.626134 systemd[1]: Created slice kubepods-burstable-podc7b9900ffd2d6250395d0aa6fd2703bc.slice. Jul 2 07:54:07.635264 kubelet[1798]: I0702 07:54:07.635229 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-ca-certs\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.635547 kubelet[1798]: I0702 07:54:07.635522 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.635672 kubelet[1798]: I0702 07:54:07.635572 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.635672 kubelet[1798]: I0702 07:54:07.635611 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.635672 kubelet[1798]: I0702 07:54:07.635650 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c7b9900ffd2d6250395d0aa6fd2703bc-ca-certs\") pod \"kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"c7b9900ffd2d6250395d0aa6fd2703bc\") " pod="kube-system/kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.635857 kubelet[1798]: I0702 07:54:07.635687 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c7b9900ffd2d6250395d0aa6fd2703bc-k8s-certs\") pod \"kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"c7b9900ffd2d6250395d0aa6fd2703bc\") " pod="kube-system/kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.635857 kubelet[1798]: I0702 07:54:07.635727 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c7b9900ffd2d6250395d0aa6fd2703bc-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"c7b9900ffd2d6250395d0aa6fd2703bc\") " pod="kube-system/kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.635857 kubelet[1798]: I0702 07:54:07.635761 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.635857 kubelet[1798]: I0702 07:54:07.635808 1798 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e881b34d5754ae52bc53e87d276b91ca-kubeconfig\") pod \"kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"e881b34d5754ae52bc53e87d276b91ca\") " pod="kube-system/kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.639587 kubelet[1798]: E0702 07:54:07.639558 1798 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.108:6443: connect: connection refused" interval="400ms" Jul 2 07:54:07.752802 kubelet[1798]: I0702 07:54:07.752752 1798 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.753248 kubelet[1798]: E0702 07:54:07.753205 1798 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.108:6443/api/v1/nodes\": dial tcp 10.128.0.108:6443: connect: connection refused" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:07.912782 env[1235]: time="2024-07-02T07:54:07.912223282Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal,Uid:0769a74e36ef444d26441be684500e70,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:07.920124 env[1235]: time="2024-07-02T07:54:07.920073998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal,Uid:e881b34d5754ae52bc53e87d276b91ca,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:07.929767 env[1235]: time="2024-07-02T07:54:07.929720133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal,Uid:c7b9900ffd2d6250395d0aa6fd2703bc,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:08.041018 kubelet[1798]: E0702 07:54:08.040959 1798 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.108:6443: connect: connection refused" interval="800ms" Jul 2 07:54:08.159302 kubelet[1798]: I0702 07:54:08.159258 1798 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:08.159698 kubelet[1798]: E0702 07:54:08.159655 1798 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.108:6443/api/v1/nodes\": dial tcp 10.128.0.108:6443: connect: connection refused" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:08.336039 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3715961925.mount: Deactivated successfully. Jul 2 07:54:08.342726 env[1235]: time="2024-07-02T07:54:08.342665181Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.344014 env[1235]: time="2024-07-02T07:54:08.343960081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.348442 env[1235]: time="2024-07-02T07:54:08.348360163Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.349788 env[1235]: time="2024-07-02T07:54:08.349730896Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.352523 env[1235]: time="2024-07-02T07:54:08.352456672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.353958 env[1235]: time="2024-07-02T07:54:08.353906730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.354967 env[1235]: time="2024-07-02T07:54:08.354910450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.355918 env[1235]: time="2024-07-02T07:54:08.355868184Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.365566 env[1235]: time="2024-07-02T07:54:08.365510295Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.367642 env[1235]: time="2024-07-02T07:54:08.367576826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.372550 env[1235]: time="2024-07-02T07:54:08.372511136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.376507 env[1235]: time="2024-07-02T07:54:08.376458732Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:08.398474 env[1235]: time="2024-07-02T07:54:08.398311154Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:08.398474 env[1235]: time="2024-07-02T07:54:08.398363206Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:08.398692 env[1235]: time="2024-07-02T07:54:08.398459212Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:08.405961 env[1235]: time="2024-07-02T07:54:08.398727862Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d0e94cc5c8c9cb0d7352b178f60091503975f8eb448d117870a7b8686fe161a pid=1838 runtime=io.containerd.runc.v2 Jul 2 07:54:08.438401 systemd[1]: Started cri-containerd-1d0e94cc5c8c9cb0d7352b178f60091503975f8eb448d117870a7b8686fe161a.scope. Jul 2 07:54:08.455095 env[1235]: time="2024-07-02T07:54:08.454744823Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:08.455095 env[1235]: time="2024-07-02T07:54:08.454805292Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:08.455095 env[1235]: time="2024-07-02T07:54:08.454834223Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:08.455468 env[1235]: time="2024-07-02T07:54:08.455322968Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f984f6e833002737d245efb1b8dd5af27fd1180062c2d48429657c9d57842038 pid=1871 runtime=io.containerd.runc.v2 Jul 2 07:54:08.471003 env[1235]: time="2024-07-02T07:54:08.463782353Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:08.471003 env[1235]: time="2024-07-02T07:54:08.463921268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:08.471003 env[1235]: time="2024-07-02T07:54:08.463991300Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:08.471003 env[1235]: time="2024-07-02T07:54:08.464842493Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75376e8a5f4c8218c05e8a7a796f348aa63309b4723ebb33a8f2b8d0f29bb2f7 pid=1874 runtime=io.containerd.runc.v2 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.473000 audit: BPF prog-id=64 op=LOAD Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1838 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306539346363356338633963623064373335326231373866363030 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1838 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306539346363356338633963623064373335326231373866363030 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit: BPF prog-id=65 op=LOAD Jul 2 07:54:08.474000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ad90 items=0 ppid=1838 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306539346363356338633963623064373335326231373866363030 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit: BPF prog-id=66 op=LOAD Jul 2 07:54:08.474000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028add8 items=0 ppid=1838 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306539346363356338633963623064373335326231373866363030 Jul 2 07:54:08.474000 audit: BPF prog-id=66 op=UNLOAD Jul 2 07:54:08.474000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.474000 audit: BPF prog-id=67 op=LOAD Jul 2 07:54:08.474000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028b1e8 items=0 ppid=1838 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306539346363356338633963623064373335326231373866363030 Jul 2 07:54:08.511815 systemd[1]: Started cri-containerd-75376e8a5f4c8218c05e8a7a796f348aa63309b4723ebb33a8f2b8d0f29bb2f7.scope. Jul 2 07:54:08.532729 systemd[1]: Started cri-containerd-f984f6e833002737d245efb1b8dd5af27fd1180062c2d48429657c9d57842038.scope. Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.564000 audit: BPF prog-id=68 op=LOAD Jul 2 07:54:08.565000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.565000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1871 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383466366538333330303237333764323435656662316238646435 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1871 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383466366538333330303237333764323435656662316238646435 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.566000 audit: BPF prog-id=69 op=LOAD Jul 2 07:54:08.566000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00034d0e0 items=0 ppid=1871 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383466366538333330303237333764323435656662316238646435 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.567000 audit: BPF prog-id=70 op=LOAD Jul 2 07:54:08.567000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00034d128 items=0 ppid=1871 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383466366538333330303237333764323435656662316238646435 Jul 2 07:54:08.569000 audit: BPF prog-id=70 op=UNLOAD Jul 2 07:54:08.569000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.569000 audit: BPF prog-id=71 op=LOAD Jul 2 07:54:08.569000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00034d538 items=0 ppid=1871 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383466366538333330303237333764323435656662316238646435 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.570000 audit: BPF prog-id=72 op=LOAD Jul 2 07:54:08.571000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.571000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1874 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333736653861356634633832313863303565386137613739366633 Jul 2 07:54:08.571000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.571000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1874 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333736653861356634633832313863303565386137613739366633 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit: BPF prog-id=73 op=LOAD Jul 2 07:54:08.573000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bb000 items=0 ppid=1874 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333736653861356634633832313863303565386137613739366633 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit: BPF prog-id=74 op=LOAD Jul 2 07:54:08.573000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bb048 items=0 ppid=1874 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333736653861356634633832313863303565386137613739366633 Jul 2 07:54:08.573000 audit: BPF prog-id=74 op=UNLOAD Jul 2 07:54:08.573000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.573000 audit: BPF prog-id=75 op=LOAD Jul 2 07:54:08.573000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bb458 items=0 ppid=1874 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333736653861356634633832313863303565386137613739366633 Jul 2 07:54:08.576680 env[1235]: time="2024-07-02T07:54:08.572725375Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal,Uid:e881b34d5754ae52bc53e87d276b91ca,Namespace:kube-system,Attempt:0,} returns sandbox id \"1d0e94cc5c8c9cb0d7352b178f60091503975f8eb448d117870a7b8686fe161a\"" Jul 2 07:54:08.578562 kubelet[1798]: E0702 07:54:08.578531 1798 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-21291" Jul 2 07:54:08.594934 env[1235]: time="2024-07-02T07:54:08.583299547Z" level=info msg="CreateContainer within sandbox \"1d0e94cc5c8c9cb0d7352b178f60091503975f8eb448d117870a7b8686fe161a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 07:54:08.605906 kubelet[1798]: W0702 07:54:08.605754 1798 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:08.605906 kubelet[1798]: E0702 07:54:08.605840 1798 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:08.607571 env[1235]: time="2024-07-02T07:54:08.607509880Z" level=info msg="CreateContainer within sandbox \"1d0e94cc5c8c9cb0d7352b178f60091503975f8eb448d117870a7b8686fe161a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6623b29d23094f81da63cd32e465e45de2da4a022ca1a8fa3edcfa6b9da478ce\"" Jul 2 07:54:08.608514 env[1235]: time="2024-07-02T07:54:08.608469618Z" level=info msg="StartContainer for \"6623b29d23094f81da63cd32e465e45de2da4a022ca1a8fa3edcfa6b9da478ce\"" Jul 2 07:54:08.629125 kubelet[1798]: W0702 07:54:08.629022 1798 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:08.629308 kubelet[1798]: E0702 07:54:08.629164 1798 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:08.654373 systemd[1]: Started cri-containerd-6623b29d23094f81da63cd32e465e45de2da4a022ca1a8fa3edcfa6b9da478ce.scope. Jul 2 07:54:08.671083 env[1235]: time="2024-07-02T07:54:08.671029980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal,Uid:0769a74e36ef444d26441be684500e70,Namespace:kube-system,Attempt:0,} returns sandbox id \"75376e8a5f4c8218c05e8a7a796f348aa63309b4723ebb33a8f2b8d0f29bb2f7\"" Jul 2 07:54:08.677982 kubelet[1798]: E0702 07:54:08.677501 1798 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flat" Jul 2 07:54:08.682268 env[1235]: time="2024-07-02T07:54:08.682211288Z" level=info msg="CreateContainer within sandbox \"75376e8a5f4c8218c05e8a7a796f348aa63309b4723ebb33a8f2b8d0f29bb2f7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.691000 audit: BPF prog-id=76 op=LOAD Jul 2 07:54:08.694007 env[1235]: time="2024-07-02T07:54:08.693925951Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal,Uid:c7b9900ffd2d6250395d0aa6fd2703bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"f984f6e833002737d245efb1b8dd5af27fd1180062c2d48429657c9d57842038\"" Jul 2 07:54:08.693000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.693000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1838 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323362323964323330393466383164613633636433326534363565 Jul 2 07:54:08.694000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.694000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1838 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.696170 kubelet[1798]: E0702 07:54:08.696102 1798 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-21291" Jul 2 07:54:08.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323362323964323330393466383164613633636433326534363565 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.695000 audit: BPF prog-id=77 op=LOAD Jul 2 07:54:08.695000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000356190 items=0 ppid=1838 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323362323964323330393466383164613633636433326534363565 Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700305 env[1235]: time="2024-07-02T07:54:08.698833028Z" level=info msg="CreateContainer within sandbox \"f984f6e833002737d245efb1b8dd5af27fd1180062c2d48429657c9d57842038\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 07:54:08.698000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.698000 audit: BPF prog-id=78 op=LOAD Jul 2 07:54:08.698000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003561d8 items=0 ppid=1838 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323362323964323330393466383164613633636433326534363565 Jul 2 07:54:08.700000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:54:08.700000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.700000 audit: BPF prog-id=79 op=LOAD Jul 2 07:54:08.700000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003565e8 items=0 ppid=1838 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323362323964323330393466383164613633636433326534363565 Jul 2 07:54:08.712805 env[1235]: time="2024-07-02T07:54:08.712746083Z" level=info msg="CreateContainer within sandbox \"75376e8a5f4c8218c05e8a7a796f348aa63309b4723ebb33a8f2b8d0f29bb2f7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"30cf88955de3640305c5d59ec8e3e6dbce6ffd233deeddfe2cc4ca6c3d1ee192\"" Jul 2 07:54:08.715275 env[1235]: time="2024-07-02T07:54:08.715233665Z" level=info msg="StartContainer for \"30cf88955de3640305c5d59ec8e3e6dbce6ffd233deeddfe2cc4ca6c3d1ee192\"" Jul 2 07:54:08.730919 env[1235]: time="2024-07-02T07:54:08.730835222Z" level=info msg="CreateContainer within sandbox \"f984f6e833002737d245efb1b8dd5af27fd1180062c2d48429657c9d57842038\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f6f76b36f6a1831d7fc59568fa3b9350e30c4e7045f03a5bf7806a0eaa769012\"" Jul 2 07:54:08.732408 env[1235]: time="2024-07-02T07:54:08.732356588Z" level=info msg="StartContainer for \"f6f76b36f6a1831d7fc59568fa3b9350e30c4e7045f03a5bf7806a0eaa769012\"" Jul 2 07:54:08.751293 kubelet[1798]: W0702 07:54:08.751223 1798 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:08.751293 kubelet[1798]: E0702 07:54:08.751306 1798 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:08.769722 systemd[1]: Started cri-containerd-30cf88955de3640305c5d59ec8e3e6dbce6ffd233deeddfe2cc4ca6c3d1ee192.scope. Jul 2 07:54:08.783151 systemd[1]: Started cri-containerd-f6f76b36f6a1831d7fc59568fa3b9350e30c4e7045f03a5bf7806a0eaa769012.scope. Jul 2 07:54:08.798209 env[1235]: time="2024-07-02T07:54:08.798147155Z" level=info msg="StartContainer for \"6623b29d23094f81da63cd32e465e45de2da4a022ca1a8fa3edcfa6b9da478ce\" returns successfully" Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.816000 audit: BPF prog-id=80 op=LOAD Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1874 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330636638383935356465333634303330356335643539656338653365 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1874 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330636638383935356465333634303330356335643539656338653365 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.818000 audit: BPF prog-id=81 op=LOAD Jul 2 07:54:08.818000 audit[1990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024640 items=0 ppid=1874 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330636638383935356465333634303330356335643539656338653365 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.822000 audit: BPF prog-id=82 op=LOAD Jul 2 07:54:08.822000 audit[1990]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024688 items=0 ppid=1874 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330636638383935356465333634303330356335643539656338653365 Jul 2 07:54:08.823000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:54:08.823000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { perfmon } for pid=1990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit[1990]: AVC avc: denied { bpf } for pid=1990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.823000 audit: BPF prog-id=83 op=LOAD Jul 2 07:54:08.823000 audit[1990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024a98 items=0 ppid=1874 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330636638383935356465333634303330356335643539656338653365 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.833000 audit: BPF prog-id=84 op=LOAD Jul 2 07:54:08.835000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.835000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1871 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636663736623336663661313833316437666335393536386661336239 Jul 2 07:54:08.835000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.835000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1871 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636663736623336663661313833316437666335393536386661336239 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.836000 audit: BPF prog-id=85 op=LOAD Jul 2 07:54:08.836000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009b670 items=0 ppid=1871 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636663736623336663661313833316437666335393536386661336239 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.837000 audit: BPF prog-id=86 op=LOAD Jul 2 07:54:08.837000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009b6b8 items=0 ppid=1871 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636663736623336663661313833316437666335393536386661336239 Jul 2 07:54:08.838000 audit: BPF prog-id=86 op=UNLOAD Jul 2 07:54:08.839000 audit: BPF prog-id=85 op=UNLOAD Jul 2 07:54:08.840079 kubelet[1798]: W0702 07:54:08.839961 1798 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:08.840079 kubelet[1798]: E0702 07:54:08.840056 1798 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.108:6443: connect: connection refused Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:08.839000 audit: BPF prog-id=87 op=LOAD Jul 2 07:54:08.841525 kubelet[1798]: E0702 07:54:08.841484 1798 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.108:6443: connect: connection refused" interval="1.6s" Jul 2 07:54:08.839000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009bac8 items=0 ppid=1871 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:08.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636663736623336663661313833316437666335393536386661336239 Jul 2 07:54:08.895805 env[1235]: time="2024-07-02T07:54:08.895677272Z" level=info msg="StartContainer for \"30cf88955de3640305c5d59ec8e3e6dbce6ffd233deeddfe2cc4ca6c3d1ee192\" returns successfully" Jul 2 07:54:08.899258 env[1235]: time="2024-07-02T07:54:08.899209231Z" level=info msg="StartContainer for \"f6f76b36f6a1831d7fc59568fa3b9350e30c4e7045f03a5bf7806a0eaa769012\" returns successfully" Jul 2 07:54:08.965598 kubelet[1798]: I0702 07:54:08.965560 1798 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:08.966018 kubelet[1798]: E0702 07:54:08.965993 1798 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.108:6443/api/v1/nodes\": dial tcp 10.128.0.108:6443: connect: connection refused" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:10.571671 kubelet[1798]: I0702 07:54:10.571638 1798 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:12.785000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:12.792108 kernel: kauditd_printk_skb: 557 callbacks suppressed Jul 2 07:54:12.792231 kernel: audit: type=1400 audit(1719906852.785:557): avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:12.785000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00468c480 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:12.867363 kernel: audit: type=1300 audit(1719906852.785:557): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00468c480 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:12.785000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:12.923004 kernel: audit: type=1327 audit(1719906852.785:557): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:12.923187 kernel: audit: type=1400 audit(1719906852.818:558): avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:12.818000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:12.818000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c001090d20 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:12.986995 kernel: audit: type=1300 audit(1719906852.818:558): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c001090d20 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:12.987178 kernel: audit: type=1327 audit(1719906852.818:558): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:12.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:13.012945 kernel: audit: type=1400 audit(1719906852.835:559): avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:12.835000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:13.046913 kernel: audit: type=1300 audit(1719906852.835:559): arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c00455f940 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:12.835000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c00455f940 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:12.835000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:13.102920 kernel: audit: type=1327 audit(1719906852.835:559): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:12.842000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:12.842000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00468dd40 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:12.842000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:13.019000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:13.019000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00a3d33a0 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:13.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:13.019000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:13.019000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c005368960 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:54:13.131919 kernel: audit: type=1400 audit(1719906852.842:560): avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:13.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:54:13.195000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:13.195000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ac8000 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:54:13.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:13.196000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:13.196000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00068a0e0 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:54:13.196000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:13.202682 kubelet[1798]: I0702 07:54:13.202614 1798 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:13.315641 kubelet[1798]: E0702 07:54:13.315470 1798 controller.go:146] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Jul 2 07:54:13.401102 kubelet[1798]: I0702 07:54:13.401060 1798 apiserver.go:52] "Watching apiserver" Jul 2 07:54:13.435098 kubelet[1798]: I0702 07:54:13.435042 1798 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:54:13.812564 update_engine[1226]: I0702 07:54:13.812496 1226 update_attempter.cc:509] Updating boot flags... Jul 2 07:54:14.423419 kubelet[1798]: W0702 07:54:14.423386 1798 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:54:15.726000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:15.726000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e2f460 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:54:15.726000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:15.728000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:15.728000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e2f620 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:54:15.728000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:15.730000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:15.730000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e2f7e0 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:54:15.730000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:15.732000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:15.732000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e2f9a0 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:54:15.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:15.850799 systemd[1]: Reloading. Jul 2 07:54:16.023319 /usr/lib/systemd/system-generators/torcx-generator[2105]: time="2024-07-02T07:54:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:54:16.023364 /usr/lib/systemd/system-generators/torcx-generator[2105]: time="2024-07-02T07:54:16Z" level=info msg="torcx already run" Jul 2 07:54:16.193137 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:54:16.193163 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:54:16.220672 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.333000 audit: BPF prog-id=88 op=LOAD Jul 2 07:54:16.333000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit: BPF prog-id=89 op=LOAD Jul 2 07:54:16.339000 audit: BPF prog-id=49 op=UNLOAD Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit: BPF prog-id=90 op=LOAD Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.339000 audit: BPF prog-id=91 op=LOAD Jul 2 07:54:16.340000 audit: BPF prog-id=50 op=UNLOAD Jul 2 07:54:16.340000 audit: BPF prog-id=51 op=UNLOAD Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit: BPF prog-id=92 op=LOAD Jul 2 07:54:16.345000 audit: BPF prog-id=84 op=UNLOAD Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.346000 audit: BPF prog-id=93 op=LOAD Jul 2 07:54:16.346000 audit: BPF prog-id=72 op=UNLOAD Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.347000 audit: BPF prog-id=94 op=LOAD Jul 2 07:54:16.347000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:54:16.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit: BPF prog-id=95 op=LOAD Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit: BPF prog-id=96 op=LOAD Jul 2 07:54:16.348000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:54:16.348000 audit: BPF prog-id=54 op=UNLOAD Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit: BPF prog-id=97 op=LOAD Jul 2 07:54:16.349000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit: BPF prog-id=98 op=LOAD Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.349000 audit: BPF prog-id=99 op=LOAD Jul 2 07:54:16.350000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:54:16.350000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.351000 audit: BPF prog-id=100 op=LOAD Jul 2 07:54:16.351000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.352000 audit: BPF prog-id=101 op=LOAD Jul 2 07:54:16.352000 audit: BPF prog-id=68 op=UNLOAD Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit: BPF prog-id=102 op=LOAD Jul 2 07:54:16.356000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit: BPF prog-id=103 op=LOAD Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.356000 audit: BPF prog-id=104 op=LOAD Jul 2 07:54:16.356000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:54:16.356000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.357000 audit: BPF prog-id=105 op=LOAD Jul 2 07:54:16.358000 audit: BPF prog-id=62 op=UNLOAD Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.360000 audit: BPF prog-id=106 op=LOAD Jul 2 07:54:16.360000 audit: BPF prog-id=76 op=UNLOAD Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.361000 audit: BPF prog-id=107 op=LOAD Jul 2 07:54:16.361000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.362000 audit: BPF prog-id=108 op=LOAD Jul 2 07:54:16.362000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:54:16.389499 systemd[1]: Stopping kubelet.service... Jul 2 07:54:16.390009 kubelet[1798]: I0702 07:54:16.389456 1798 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:54:16.411326 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:54:16.411566 systemd[1]: Stopped kubelet.service. Jul 2 07:54:16.411641 systemd[1]: kubelet.service: Consumed 1.225s CPU time. Jul 2 07:54:16.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:16.414662 systemd[1]: Starting kubelet.service... Jul 2 07:54:16.638853 systemd[1]: Started kubelet.service. Jul 2 07:54:16.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:16.752574 kubelet[2153]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:54:16.753207 kubelet[2153]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:54:16.753293 kubelet[2153]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:54:16.753463 kubelet[2153]: I0702 07:54:16.753421 2153 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:54:16.772164 kubelet[2153]: I0702 07:54:16.772095 2153 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 07:54:16.772164 kubelet[2153]: I0702 07:54:16.772134 2153 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:54:16.772516 kubelet[2153]: I0702 07:54:16.772474 2153 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 07:54:16.776062 kubelet[2153]: I0702 07:54:16.776011 2153 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 07:54:16.780774 kubelet[2153]: I0702 07:54:16.780740 2153 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:54:16.797943 kubelet[2153]: I0702 07:54:16.797865 2153 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:54:16.799336 kubelet[2153]: I0702 07:54:16.798287 2153 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:54:16.799336 kubelet[2153]: I0702 07:54:16.798712 2153 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:54:16.799336 kubelet[2153]: I0702 07:54:16.798771 2153 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:54:16.799336 kubelet[2153]: I0702 07:54:16.798789 2153 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:54:16.799336 kubelet[2153]: I0702 07:54:16.798902 2153 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:54:16.799336 kubelet[2153]: I0702 07:54:16.799041 2153 kubelet.go:393] "Attempting to sync node with API server" Jul 2 07:54:16.799822 kubelet[2153]: I0702 07:54:16.799069 2153 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:54:16.799822 kubelet[2153]: I0702 07:54:16.799150 2153 kubelet.go:309] "Adding apiserver pod source" Jul 2 07:54:16.799822 kubelet[2153]: I0702 07:54:16.799176 2153 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:54:16.804542 kubelet[2153]: I0702 07:54:16.804509 2153 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:54:16.823499 kubelet[2153]: I0702 07:54:16.823463 2153 server.go:1232] "Started kubelet" Jul 2 07:54:16.831329 kubelet[2153]: I0702 07:54:16.831290 2153 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 07:54:16.832644 kubelet[2153]: I0702 07:54:16.831926 2153 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:54:16.835000 audit[2153]: AVC avc: denied { mac_admin } for pid=2153 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.835000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:16.835000 audit[2153]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bfaae0 a1=c0008bddb8 a2=c000bfaab0 a3=25 items=0 ppid=1 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:16.835000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:16.835000 audit[2153]: AVC avc: denied { mac_admin } for pid=2153 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:16.835000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:16.835000 audit[2153]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000afb9a0 a1=c0008bddd0 a2=c000bfab70 a3=25 items=0 ppid=1 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:16.835000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:16.839478 kubelet[2153]: I0702 07:54:16.836563 2153 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:54:16.839478 kubelet[2153]: I0702 07:54:16.836667 2153 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:54:16.839478 kubelet[2153]: I0702 07:54:16.836711 2153 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:54:16.839888 kubelet[2153]: I0702 07:54:16.839850 2153 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:54:16.841481 kubelet[2153]: I0702 07:54:16.841420 2153 server.go:462] "Adding debug handlers to kubelet server" Jul 2 07:54:16.852363 kubelet[2153]: I0702 07:54:16.848164 2153 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:54:16.852363 kubelet[2153]: I0702 07:54:16.849498 2153 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:54:16.852363 kubelet[2153]: I0702 07:54:16.850719 2153 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:54:16.858000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:54:16.858000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005cd880 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:54:16.858000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:16.868056 kubelet[2153]: E0702 07:54:16.868017 2153 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 07:54:16.868658 kubelet[2153]: E0702 07:54:16.868625 2153 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:54:16.953236 kubelet[2153]: I0702 07:54:16.949181 2153 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:54:16.965045 kubelet[2153]: I0702 07:54:16.965001 2153 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:54:16.965045 kubelet[2153]: I0702 07:54:16.965036 2153 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:54:16.965385 kubelet[2153]: I0702 07:54:16.965364 2153 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:16.973174 kubelet[2153]: I0702 07:54:16.972039 2153 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 07:54:16.973174 kubelet[2153]: E0702 07:54:16.972133 2153 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:54:16.993402 kubelet[2153]: I0702 07:54:16.993367 2153 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:16.996533 kubelet[2153]: I0702 07:54:16.996493 2153 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.083263 kubelet[2153]: E0702 07:54:17.083220 2153 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 07:54:17.085446 kubelet[2153]: I0702 07:54:17.085127 2153 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:54:17.085648 kubelet[2153]: I0702 07:54:17.085630 2153 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:54:17.085771 kubelet[2153]: I0702 07:54:17.085758 2153 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:54:17.086835 kubelet[2153]: I0702 07:54:17.086085 2153 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 07:54:17.087028 kubelet[2153]: I0702 07:54:17.087011 2153 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 07:54:17.087115 kubelet[2153]: I0702 07:54:17.087104 2153 policy_none.go:49] "None policy: Start" Jul 2 07:54:17.088540 kubelet[2153]: I0702 07:54:17.088330 2153 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 07:54:17.088540 kubelet[2153]: I0702 07:54:17.088375 2153 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:54:17.088715 kubelet[2153]: I0702 07:54:17.088648 2153 state_mem.go:75] "Updated machine memory state" Jul 2 07:54:17.096317 kubelet[2153]: I0702 07:54:17.096267 2153 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:54:17.095000 audit[2153]: AVC avc: denied { mac_admin } for pid=2153 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:17.095000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:54:17.095000 audit[2153]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00124e5a0 a1=c0011533e0 a2=c00124e570 a3=25 items=0 ppid=1 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:17.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:54:17.096905 kubelet[2153]: I0702 07:54:17.096375 2153 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:54:17.099087 kubelet[2153]: I0702 07:54:17.099049 2153 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:54:17.286101 kubelet[2153]: I0702 07:54:17.286063 2153 topology_manager.go:215] "Topology Admit Handler" podUID="e881b34d5754ae52bc53e87d276b91ca" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.286492 kubelet[2153]: I0702 07:54:17.286459 2153 topology_manager.go:215] "Topology Admit Handler" podUID="c7b9900ffd2d6250395d0aa6fd2703bc" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.287307 kubelet[2153]: I0702 07:54:17.287271 2153 topology_manager.go:215] "Topology Admit Handler" podUID="0769a74e36ef444d26441be684500e70" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.292501 kubelet[2153]: W0702 07:54:17.292478 2153 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:54:17.295086 kubelet[2153]: W0702 07:54:17.295063 2153 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:54:17.297245 kubelet[2153]: W0702 07:54:17.297224 2153 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:54:17.297530 kubelet[2153]: E0702 07:54:17.297497 2153 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363065 kubelet[2153]: I0702 07:54:17.363008 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363279 kubelet[2153]: I0702 07:54:17.363092 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363279 kubelet[2153]: I0702 07:54:17.363131 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363279 kubelet[2153]: I0702 07:54:17.363171 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363279 kubelet[2153]: I0702 07:54:17.363212 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c7b9900ffd2d6250395d0aa6fd2703bc-k8s-certs\") pod \"kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"c7b9900ffd2d6250395d0aa6fd2703bc\") " pod="kube-system/kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363511 kubelet[2153]: I0702 07:54:17.363244 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0769a74e36ef444d26441be684500e70-ca-certs\") pod \"kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"0769a74e36ef444d26441be684500e70\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363511 kubelet[2153]: I0702 07:54:17.363292 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c7b9900ffd2d6250395d0aa6fd2703bc-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"c7b9900ffd2d6250395d0aa6fd2703bc\") " pod="kube-system/kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363511 kubelet[2153]: I0702 07:54:17.363332 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e881b34d5754ae52bc53e87d276b91ca-kubeconfig\") pod \"kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"e881b34d5754ae52bc53e87d276b91ca\") " pod="kube-system/kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.363511 kubelet[2153]: I0702 07:54:17.363379 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c7b9900ffd2d6250395d0aa6fd2703bc-ca-certs\") pod \"kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" (UID: \"c7b9900ffd2d6250395d0aa6fd2703bc\") " pod="kube-system/kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:17.814189 kubelet[2153]: I0702 07:54:17.814131 2153 apiserver.go:52] "Watching apiserver" Jul 2 07:54:17.850143 kubelet[2153]: I0702 07:54:17.850088 2153 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:54:18.049957 kubelet[2153]: W0702 07:54:18.049919 2153 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:54:18.050147 kubelet[2153]: E0702 07:54:18.050024 2153 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:18.051229 kubelet[2153]: W0702 07:54:18.051197 2153 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:54:18.051358 kubelet[2153]: E0702 07:54:18.051278 2153 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:18.097996 kubelet[2153]: I0702 07:54:18.097826 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" podStartSLOduration=1.097744304 podCreationTimestamp="2024-07-02 07:54:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:18.086246411 +0000 UTC m=+1.436282680" watchObservedRunningTime="2024-07-02 07:54:18.097744304 +0000 UTC m=+1.447780571" Jul 2 07:54:18.123731 kubelet[2153]: I0702 07:54:18.123687 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" podStartSLOduration=1.123629951 podCreationTimestamp="2024-07-02 07:54:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:18.099161289 +0000 UTC m=+1.449197557" watchObservedRunningTime="2024-07-02 07:54:18.123629951 +0000 UTC m=+1.473666219" Jul 2 07:54:21.900461 sudo[1454]: pam_unix(sudo:session): session closed for user root Jul 2 07:54:21.899000 audit[1454]: USER_END pid=1454 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:21.906117 kernel: kauditd_printk_skb: 287 callbacks suppressed Jul 2 07:54:21.906257 kernel: audit: type=1106 audit(1719906861.899:819): pid=1454 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:21.910000 audit[1454]: CRED_DISP pid=1454 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:21.954340 kernel: audit: type=1104 audit(1719906861.910:820): pid=1454 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:54:21.975074 sshd[1451]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:21.975000 audit[1451]: USER_END pid=1451 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:21.980183 systemd[1]: sshd@6-10.128.0.108:22-147.75.109.163:43762.service: Deactivated successfully. Jul 2 07:54:21.981285 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:54:21.981501 systemd[1]: session-7.scope: Consumed 7.385s CPU time. Jul 2 07:54:21.982520 systemd-logind[1224]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:54:21.984971 systemd-logind[1224]: Removed session 7. Jul 2 07:54:21.976000 audit[1451]: CRED_DISP pid=1451 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:22.035813 kernel: audit: type=1106 audit(1719906861.975:821): pid=1451 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:22.035986 kernel: audit: type=1104 audit(1719906861.976:822): pid=1451 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:22.036044 kernel: audit: type=1131 audit(1719906861.979:823): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.108:22-147.75.109.163:43762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:21.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.108:22-147.75.109.163:43762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:22.266763 kubelet[2153]: I0702 07:54:22.266615 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" podStartSLOduration=8.266564638 podCreationTimestamp="2024-07-02 07:54:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:18.124539733 +0000 UTC m=+1.474576000" watchObservedRunningTime="2024-07-02 07:54:22.266564638 +0000 UTC m=+5.616600906" Jul 2 07:54:28.839993 kubelet[2153]: I0702 07:54:28.839949 2153 kuberuntime_manager.go:1528] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 07:54:28.840671 env[1235]: time="2024-07-02T07:54:28.840619266Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:54:28.841173 kubelet[2153]: I0702 07:54:28.840949 2153 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 07:54:29.330738 kubelet[2153]: I0702 07:54:29.330692 2153 topology_manager.go:215] "Topology Admit Handler" podUID="068e883c-ceaf-4368-a3f4-4d261eb17dcf" podNamespace="kube-system" podName="kube-proxy-l78hn" Jul 2 07:54:29.340791 systemd[1]: Created slice kubepods-besteffort-pod068e883c_ceaf_4368_a3f4_4d261eb17dcf.slice. Jul 2 07:54:29.349667 kubelet[2153]: I0702 07:54:29.349634 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/068e883c-ceaf-4368-a3f4-4d261eb17dcf-kube-proxy\") pod \"kube-proxy-l78hn\" (UID: \"068e883c-ceaf-4368-a3f4-4d261eb17dcf\") " pod="kube-system/kube-proxy-l78hn" Jul 2 07:54:29.350041 kubelet[2153]: I0702 07:54:29.350018 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/068e883c-ceaf-4368-a3f4-4d261eb17dcf-lib-modules\") pod \"kube-proxy-l78hn\" (UID: \"068e883c-ceaf-4368-a3f4-4d261eb17dcf\") " pod="kube-system/kube-proxy-l78hn" Jul 2 07:54:29.350267 kubelet[2153]: I0702 07:54:29.350251 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/068e883c-ceaf-4368-a3f4-4d261eb17dcf-xtables-lock\") pod \"kube-proxy-l78hn\" (UID: \"068e883c-ceaf-4368-a3f4-4d261eb17dcf\") " pod="kube-system/kube-proxy-l78hn" Jul 2 07:54:29.350486 kubelet[2153]: I0702 07:54:29.350468 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nqc9g\" (UniqueName: \"kubernetes.io/projected/068e883c-ceaf-4368-a3f4-4d261eb17dcf-kube-api-access-nqc9g\") pod \"kube-proxy-l78hn\" (UID: \"068e883c-ceaf-4368-a3f4-4d261eb17dcf\") " pod="kube-system/kube-proxy-l78hn" Jul 2 07:54:29.613617 kubelet[2153]: I0702 07:54:29.613479 2153 topology_manager.go:215] "Topology Admit Handler" podUID="3e620d7c-fcb7-4b86-ade9-489940976e71" podNamespace="tigera-operator" podName="tigera-operator-76c4974c85-lrg4p" Jul 2 07:54:29.621994 systemd[1]: Created slice kubepods-besteffort-pod3e620d7c_fcb7_4b86_ade9_489940976e71.slice. Jul 2 07:54:29.651616 kubelet[2153]: I0702 07:54:29.651577 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mv4cv\" (UniqueName: \"kubernetes.io/projected/3e620d7c-fcb7-4b86-ade9-489940976e71-kube-api-access-mv4cv\") pod \"tigera-operator-76c4974c85-lrg4p\" (UID: \"3e620d7c-fcb7-4b86-ade9-489940976e71\") " pod="tigera-operator/tigera-operator-76c4974c85-lrg4p" Jul 2 07:54:29.651839 kubelet[2153]: I0702 07:54:29.651645 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3e620d7c-fcb7-4b86-ade9-489940976e71-var-lib-calico\") pod \"tigera-operator-76c4974c85-lrg4p\" (UID: \"3e620d7c-fcb7-4b86-ade9-489940976e71\") " pod="tigera-operator/tigera-operator-76c4974c85-lrg4p" Jul 2 07:54:29.652835 env[1235]: time="2024-07-02T07:54:29.652776833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-l78hn,Uid:068e883c-ceaf-4368-a3f4-4d261eb17dcf,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:29.681652 env[1235]: time="2024-07-02T07:54:29.681540875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:29.681652 env[1235]: time="2024-07-02T07:54:29.681594646Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:29.682009 env[1235]: time="2024-07-02T07:54:29.681614081Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:29.682734 env[1235]: time="2024-07-02T07:54:29.682378384Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a99e66e2a8a8e1543f7f5f199622556d3fd33ed0ebd4394b0904fb42905173d pid=2242 runtime=io.containerd.runc.v2 Jul 2 07:54:29.712344 systemd[1]: Started cri-containerd-4a99e66e2a8a8e1543f7f5f199622556d3fd33ed0ebd4394b0904fb42905173d.scope. Jul 2 07:54:29.724405 systemd[1]: run-containerd-runc-k8s.io-4a99e66e2a8a8e1543f7f5f199622556d3fd33ed0ebd4394b0904fb42905173d-runc.y1Spsg.mount: Deactivated successfully. Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.765149 kernel: audit: type=1400 audit(1719906869.742:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.806835 kernel: audit: type=1400 audit(1719906869.742:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.807028 kernel: audit: type=1400 audit(1719906869.742:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.829151 kernel: audit: type=1400 audit(1719906869.742:827): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.852753 kernel: audit: type=1400 audit(1719906869.742:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.873603 env[1235]: time="2024-07-02T07:54:29.872373105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-l78hn,Uid:068e883c-ceaf-4368-a3f4-4d261eb17dcf,Namespace:kube-system,Attempt:0,} returns sandbox id \"4a99e66e2a8a8e1543f7f5f199622556d3fd33ed0ebd4394b0904fb42905173d\"" Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.880972 env[1235]: time="2024-07-02T07:54:29.880928803Z" level=info msg="CreateContainer within sandbox \"4a99e66e2a8a8e1543f7f5f199622556d3fd33ed0ebd4394b0904fb42905173d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:54:29.902951 kernel: audit: type=1400 audit(1719906869.742:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.903109 kernel: audit: type=1400 audit(1719906869.742:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.903155 kernel: audit: type=1400 audit(1719906869.742:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.929963 env[1235]: time="2024-07-02T07:54:29.929913288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-lrg4p,Uid:3e620d7c-fcb7-4b86-ade9-489940976e71,Namespace:tigera-operator,Attempt:0,}" Jul 2 07:54:29.942101 kernel: audit: type=1400 audit(1719906869.742:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.949439 env[1235]: time="2024-07-02T07:54:29.949383734Z" level=info msg="CreateContainer within sandbox \"4a99e66e2a8a8e1543f7f5f199622556d3fd33ed0ebd4394b0904fb42905173d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1052bcb3fae4b3a0582bbdd103fb9811a754dbe5227c54e34bb9464d8aec82dd\"" Jul 2 07:54:29.952950 env[1235]: time="2024-07-02T07:54:29.952912872Z" level=info msg="StartContainer for \"1052bcb3fae4b3a0582bbdd103fb9811a754dbe5227c54e34bb9464d8aec82dd\"" Jul 2 07:54:29.964956 kernel: audit: type=1400 audit(1719906869.763:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.763000 audit: BPF prog-id=109 op=LOAD Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2242 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:29.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393965363665326138613865313534336637663566313939363232 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2242 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:29.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393965363665326138613865313534336637663566313939363232 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit: BPF prog-id=110 op=LOAD Jul 2 07:54:29.764000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002fc6c0 items=0 ppid=2242 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:29.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393965363665326138613865313534336637663566313939363232 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit: BPF prog-id=111 op=LOAD Jul 2 07:54:29.764000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002fc708 items=0 ppid=2242 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:29.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393965363665326138613865313534336637663566313939363232 Jul 2 07:54:29.764000 audit: BPF prog-id=111 op=UNLOAD Jul 2 07:54:29.764000 audit: BPF prog-id=110 op=UNLOAD Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:29.764000 audit: BPF prog-id=112 op=LOAD Jul 2 07:54:29.764000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002fcb18 items=0 ppid=2242 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:29.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393965363665326138613865313534336637663566313939363232 Jul 2 07:54:29.989521 env[1235]: time="2024-07-02T07:54:29.988687862Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:29.989521 env[1235]: time="2024-07-02T07:54:29.988744601Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:29.989521 env[1235]: time="2024-07-02T07:54:29.988763263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:29.989854 env[1235]: time="2024-07-02T07:54:29.989694385Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82da48945ca0fd37407c042fc106364d9deedfad51d356d3972cead4fe93ee09 pid=2293 runtime=io.containerd.runc.v2 Jul 2 07:54:30.004333 systemd[1]: Started cri-containerd-1052bcb3fae4b3a0582bbdd103fb9811a754dbe5227c54e34bb9464d8aec82dd.scope. Jul 2 07:54:30.020350 systemd[1]: Started cri-containerd-82da48945ca0fd37407c042fc106364d9deedfad51d356d3972cead4fe93ee09.scope. Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.053000 audit: BPF prog-id=113 op=LOAD Jul 2 07:54:30.053000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.053000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2293 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832646134383934356361306664333734303763303432666331303633 Jul 2 07:54:30.053000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.053000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2293 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832646134383934356361306664333734303763303432666331303633 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit: BPF prog-id=114 op=LOAD Jul 2 07:54:30.054000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ef50 items=0 ppid=2293 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832646134383934356361306664333734303763303432666331303633 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit: BPF prog-id=115 op=LOAD Jul 2 07:54:30.054000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028ef98 items=0 ppid=2293 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832646134383934356361306664333734303763303432666331303633 Jul 2 07:54:30.054000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:54:30.054000 audit: BPF prog-id=114 op=UNLOAD Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.054000 audit: BPF prog-id=116 op=LOAD Jul 2 07:54:30.054000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028f3a8 items=0 ppid=2293 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832646134383934356361306664333734303763303432666331303633 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fc6f7f1ffd8 items=0 ppid=2242 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353262636233666165346233613035383262626464313033666239 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.070000 audit: BPF prog-id=117 op=LOAD Jul 2 07:54:30.070000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c00011b598 items=0 ppid=2242 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353262636233666165346233613035383262626464313033666239 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit: BPF prog-id=118 op=LOAD Jul 2 07:54:30.071000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c00011b5e8 items=0 ppid=2242 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353262636233666165346233613035383262626464313033666239 Jul 2 07:54:30.071000 audit: BPF prog-id=118 op=UNLOAD Jul 2 07:54:30.071000 audit: BPF prog-id=117 op=UNLOAD Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.071000 audit: BPF prog-id=119 op=LOAD Jul 2 07:54:30.071000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c00011b678 items=0 ppid=2242 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353262636233666165346233613035383262626464313033666239 Jul 2 07:54:30.100081 env[1235]: time="2024-07-02T07:54:30.100020865Z" level=info msg="StartContainer for \"1052bcb3fae4b3a0582bbdd103fb9811a754dbe5227c54e34bb9464d8aec82dd\" returns successfully" Jul 2 07:54:30.116652 env[1235]: time="2024-07-02T07:54:30.116588167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-lrg4p,Uid:3e620d7c-fcb7-4b86-ade9-489940976e71,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"82da48945ca0fd37407c042fc106364d9deedfad51d356d3972cead4fe93ee09\"" Jul 2 07:54:30.126343 kubelet[2153]: E0702 07:54:30.125994 2153 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Jul 2 07:54:30.127057 env[1235]: time="2024-07-02T07:54:30.127016335Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 07:54:30.217000 audit[2377]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.217000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec84c4ac0 a2=0 a3=7ffec84c4aac items=0 ppid=2324 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:54:30.219000 audit[2378]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.219000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd05a1bd00 a2=0 a3=7ffd05a1bcec items=0 ppid=2324 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:54:30.221000 audit[2379]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.221000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd045f5480 a2=0 a3=7ffd045f546c items=0 ppid=2324 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:54:30.224000 audit[2381]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.224000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd2b19400 a2=0 a3=7ffcd2b193ec items=0 ppid=2324 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:54:30.225000 audit[2380]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.225000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc75005880 a2=0 a3=7ffc7500586c items=0 ppid=2324 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:54:30.227000 audit[2382]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.227000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb940cd80 a2=0 a3=7ffeb940cd6c items=0 ppid=2324 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:54:30.316000 audit[2383]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.316000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc4b4d74a0 a2=0 a3=7ffc4b4d748c items=0 ppid=2324 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:54:30.321000 audit[2385]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.321000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff90f1ab50 a2=0 a3=7fff90f1ab3c items=0 ppid=2324 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:54:30.328000 audit[2388]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.328000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd622fa9c0 a2=0 a3=7ffd622fa9ac items=0 ppid=2324 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:54:30.330000 audit[2389]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.330000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe263be340 a2=0 a3=7ffe263be32c items=0 ppid=2324 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:54:30.334000 audit[2391]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.334000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4cdab210 a2=0 a3=7fff4cdab1fc items=0 ppid=2324 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:54:30.336000 audit[2392]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.336000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8c343370 a2=0 a3=7ffe8c34335c items=0 ppid=2324 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:54:30.341000 audit[2394]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.341000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc887a3b30 a2=0 a3=7ffc887a3b1c items=0 ppid=2324 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:54:30.348000 audit[2397]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.348000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee2e8b880 a2=0 a3=7ffee2e8b86c items=0 ppid=2324 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:54:30.350000 audit[2398]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.350000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed46fb0e0 a2=0 a3=7ffed46fb0cc items=0 ppid=2324 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:54:30.354000 audit[2400]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.354000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea85dd1c0 a2=0 a3=7ffea85dd1ac items=0 ppid=2324 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:54:30.356000 audit[2401]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.356000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda5c4e5c0 a2=0 a3=7ffda5c4e5ac items=0 ppid=2324 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:54:30.359000 audit[2403]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.359000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1f944a60 a2=0 a3=7fff1f944a4c items=0 ppid=2324 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:54:30.365000 audit[2406]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.365000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5a4bfeb0 a2=0 a3=7ffc5a4bfe9c items=0 ppid=2324 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:54:30.371000 audit[2409]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.371000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd49e47820 a2=0 a3=7ffd49e4780c items=0 ppid=2324 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:54:30.372000 audit[2410]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.372000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd379c8b0 a2=0 a3=7fffd379c89c items=0 ppid=2324 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:54:30.376000 audit[2412]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.376000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffddaa7f280 a2=0 a3=7ffddaa7f26c items=0 ppid=2324 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:54:30.382000 audit[2415]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.382000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2e9400c0 a2=0 a3=7ffc2e9400ac items=0 ppid=2324 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:54:30.384000 audit[2416]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.384000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce20527a0 a2=0 a3=7ffce205278c items=0 ppid=2324 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:54:30.388000 audit[2418]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:30.388000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe4a5938d0 a2=0 a3=7ffe4a5938bc items=0 ppid=2324 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:54:30.420000 audit[2424]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:30.420000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe73bb2530 a2=0 a3=7ffe73bb251c items=0 ppid=2324 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:30.428000 audit[2424]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:30.428000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe73bb2530 a2=0 a3=7ffe73bb251c items=0 ppid=2324 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:30.431000 audit[2429]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.431000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffef314cc0 a2=0 a3=7fffef314cac items=0 ppid=2324 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:54:30.435000 audit[2431]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.435000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd0d9c8200 a2=0 a3=7ffd0d9c81ec items=0 ppid=2324 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:54:30.440000 audit[2434]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.440000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffeaf83900 a2=0 a3=7fffeaf838ec items=0 ppid=2324 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:54:30.442000 audit[2435]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.442000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbcd0cca0 a2=0 a3=7fffbcd0cc8c items=0 ppid=2324 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:54:30.446000 audit[2437]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.446000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffecd693a00 a2=0 a3=7ffecd6939ec items=0 ppid=2324 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:54:30.448000 audit[2438]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.448000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff944d3640 a2=0 a3=7fff944d362c items=0 ppid=2324 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:54:30.451000 audit[2440]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.451000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd9eea73a0 a2=0 a3=7ffd9eea738c items=0 ppid=2324 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:54:30.456000 audit[2443]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.456000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc6e22cb40 a2=0 a3=7ffc6e22cb2c items=0 ppid=2324 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:54:30.458000 audit[2444]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.458000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc27a1f3d0 a2=0 a3=7ffc27a1f3bc items=0 ppid=2324 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:54:30.469000 audit[2446]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.469000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4a48f650 a2=0 a3=7ffc4a48f63c items=0 ppid=2324 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:54:30.476000 audit[2447]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.476000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeae3c42f0 a2=0 a3=7ffeae3c42dc items=0 ppid=2324 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:54:30.482000 audit[2449]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.482000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce37fc9e0 a2=0 a3=7ffce37fc9cc items=0 ppid=2324 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:54:30.488000 audit[2452]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.488000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef5c33880 a2=0 a3=7ffef5c3386c items=0 ppid=2324 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:54:30.493000 audit[2455]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.493000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd381101f0 a2=0 a3=7ffd381101dc items=0 ppid=2324 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:54:30.495000 audit[2456]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.495000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc8312a4f0 a2=0 a3=7ffc8312a4dc items=0 ppid=2324 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:54:30.498000 audit[2458]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.498000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffee4f4a4e0 a2=0 a3=7ffee4f4a4cc items=0 ppid=2324 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.498000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:54:30.503000 audit[2461]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.503000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc4c980b60 a2=0 a3=7ffc4c980b4c items=0 ppid=2324 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:54:30.506000 audit[2462]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.506000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc9a035f0 a2=0 a3=7fffc9a035dc items=0 ppid=2324 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:54:30.512000 audit[2464]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.512000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff6fc47130 a2=0 a3=7fff6fc4711c items=0 ppid=2324 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:54:30.515000 audit[2465]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.515000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddb3a10d0 a2=0 a3=7ffddb3a10bc items=0 ppid=2324 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:54:30.520000 audit[2467]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.520000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9d0aa620 a2=0 a3=7fff9d0aa60c items=0 ppid=2324 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:54:30.525000 audit[2470]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:30.525000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9d204f00 a2=0 a3=7ffc9d204eec items=0 ppid=2324 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:54:30.530000 audit[2472]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:54:30.530000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd603ab3e0 a2=0 a3=7ffd603ab3cc items=0 ppid=2324 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.530000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:30.531000 audit[2472]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:54:30.531000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd603ab3e0 a2=0 a3=7ffd603ab3cc items=0 ppid=2324 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.531000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:31.087079 kubelet[2153]: I0702 07:54:31.087042 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-l78hn" podStartSLOduration=2.086988077 podCreationTimestamp="2024-07-02 07:54:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:31.085494171 +0000 UTC m=+14.435530438" watchObservedRunningTime="2024-07-02 07:54:31.086988077 +0000 UTC m=+14.437024346" Jul 2 07:54:31.096726 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3498854259.mount: Deactivated successfully. Jul 2 07:54:31.977490 env[1235]: time="2024-07-02T07:54:31.977425781Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:31.980375 env[1235]: time="2024-07-02T07:54:31.980325584Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:31.982744 env[1235]: time="2024-07-02T07:54:31.982702789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:31.984777 env[1235]: time="2024-07-02T07:54:31.984736112Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:31.985616 env[1235]: time="2024-07-02T07:54:31.985573630Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 07:54:31.989862 env[1235]: time="2024-07-02T07:54:31.989819289Z" level=info msg="CreateContainer within sandbox \"82da48945ca0fd37407c042fc106364d9deedfad51d356d3972cead4fe93ee09\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 07:54:32.010831 env[1235]: time="2024-07-02T07:54:32.010775528Z" level=info msg="CreateContainer within sandbox \"82da48945ca0fd37407c042fc106364d9deedfad51d356d3972cead4fe93ee09\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3870415fa54b80a42599445b8ebf1ae9739e335b1114f5043313d4cb2d0d78c2\"" Jul 2 07:54:32.012944 env[1235]: time="2024-07-02T07:54:32.012006242Z" level=info msg="StartContainer for \"3870415fa54b80a42599445b8ebf1ae9739e335b1114f5043313d4cb2d0d78c2\"" Jul 2 07:54:32.049326 systemd[1]: Started cri-containerd-3870415fa54b80a42599445b8ebf1ae9739e335b1114f5043313d4cb2d0d78c2.scope. Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.069000 audit: BPF prog-id=120 op=LOAD Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2293 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:32.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373034313566613534623830613432353939343435623865626631 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2293 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:32.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373034313566613534623830613432353939343435623865626631 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit: BPF prog-id=121 op=LOAD Jul 2 07:54:32.070000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000294460 items=0 ppid=2293 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:32.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373034313566613534623830613432353939343435623865626631 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.070000 audit: BPF prog-id=122 op=LOAD Jul 2 07:54:32.070000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002944a8 items=0 ppid=2293 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:32.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373034313566613534623830613432353939343435623865626631 Jul 2 07:54:32.071000 audit: BPF prog-id=122 op=UNLOAD Jul 2 07:54:32.071000 audit: BPF prog-id=121 op=UNLOAD Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:32.071000 audit: BPF prog-id=123 op=LOAD Jul 2 07:54:32.071000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002948b8 items=0 ppid=2293 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:32.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373034313566613534623830613432353939343435623865626631 Jul 2 07:54:32.094591 env[1235]: time="2024-07-02T07:54:32.094517584Z" level=info msg="StartContainer for \"3870415fa54b80a42599445b8ebf1ae9739e335b1114f5043313d4cb2d0d78c2\" returns successfully" Jul 2 07:54:33.096457 kubelet[2153]: I0702 07:54:33.096419 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4974c85-lrg4p" podStartSLOduration=2.228947457 podCreationTimestamp="2024-07-02 07:54:29 +0000 UTC" firstStartedPulling="2024-07-02 07:54:30.118630369 +0000 UTC m=+13.468666621" lastFinishedPulling="2024-07-02 07:54:31.986047749 +0000 UTC m=+15.336084007" observedRunningTime="2024-07-02 07:54:33.095966928 +0000 UTC m=+16.446003198" watchObservedRunningTime="2024-07-02 07:54:33.096364843 +0000 UTC m=+16.446401110" Jul 2 07:54:35.299000 audit[2514]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:35.323653 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 2 07:54:35.323845 kernel: audit: type=1325 audit(1719906875.299:935): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:35.299000 audit[2514]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffddb89f220 a2=0 a3=7ffddb89f20c items=0 ppid=2324 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:35.372462 kernel: audit: type=1300 audit(1719906875.299:935): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffddb89f220 a2=0 a3=7ffddb89f20c items=0 ppid=2324 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.372623 kernel: audit: type=1327 audit(1719906875.299:935): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:35.372672 kernel: audit: type=1325 audit(1719906875.300:936): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:35.300000 audit[2514]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:35.300000 audit[2514]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffddb89f220 a2=0 a3=0 items=0 ppid=2324 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.420575 kernel: audit: type=1300 audit(1719906875.300:936): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffddb89f220 a2=0 a3=0 items=0 ppid=2324 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:35.436909 kernel: audit: type=1327 audit(1719906875.300:936): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:35.437080 kernel: audit: type=1325 audit(1719906875.335:937): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:35.335000 audit[2516]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:35.335000 audit[2516]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd3f9092f0 a2=0 a3=7ffd3f9092dc items=0 ppid=2324 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.455901 kernel: audit: type=1300 audit(1719906875.335:937): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd3f9092f0 a2=0 a3=7ffd3f9092dc items=0 ppid=2324 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:35.506911 kernel: audit: type=1327 audit(1719906875.335:937): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:35.509663 kubelet[2153]: I0702 07:54:35.509610 2153 topology_manager.go:215] "Topology Admit Handler" podUID="39f4a41e-f78d-4aed-84b6-759eb03dea11" podNamespace="calico-system" podName="calico-typha-5dff75c45b-gq6xw" Jul 2 07:54:35.460000 audit[2516]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:35.519158 systemd[1]: Created slice kubepods-besteffort-pod39f4a41e_f78d_4aed_84b6_759eb03dea11.slice. Jul 2 07:54:35.531911 kernel: audit: type=1325 audit(1719906875.460:938): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:35.460000 audit[2516]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd3f9092f0 a2=0 a3=0 items=0 ppid=2324 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:35.460000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:35.598569 kubelet[2153]: I0702 07:54:35.598432 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/39f4a41e-f78d-4aed-84b6-759eb03dea11-typha-certs\") pod \"calico-typha-5dff75c45b-gq6xw\" (UID: \"39f4a41e-f78d-4aed-84b6-759eb03dea11\") " pod="calico-system/calico-typha-5dff75c45b-gq6xw" Jul 2 07:54:35.598951 kubelet[2153]: I0702 07:54:35.598921 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/39f4a41e-f78d-4aed-84b6-759eb03dea11-tigera-ca-bundle\") pod \"calico-typha-5dff75c45b-gq6xw\" (UID: \"39f4a41e-f78d-4aed-84b6-759eb03dea11\") " pod="calico-system/calico-typha-5dff75c45b-gq6xw" Jul 2 07:54:35.599205 kubelet[2153]: I0702 07:54:35.599185 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l6h4s\" (UniqueName: \"kubernetes.io/projected/39f4a41e-f78d-4aed-84b6-759eb03dea11-kube-api-access-l6h4s\") pod \"calico-typha-5dff75c45b-gq6xw\" (UID: \"39f4a41e-f78d-4aed-84b6-759eb03dea11\") " pod="calico-system/calico-typha-5dff75c45b-gq6xw" Jul 2 07:54:35.600187 kubelet[2153]: I0702 07:54:35.600159 2153 topology_manager.go:215] "Topology Admit Handler" podUID="70386587-b24b-4038-867d-2c4b0f96fc73" podNamespace="calico-system" podName="calico-node-cpfh9" Jul 2 07:54:35.609261 systemd[1]: Created slice kubepods-besteffort-pod70386587_b24b_4038_867d_2c4b0f96fc73.slice. Jul 2 07:54:35.699685 kubelet[2153]: I0702 07:54:35.699621 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-lib-modules\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.699685 kubelet[2153]: I0702 07:54:35.699690 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-policysync\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700001 kubelet[2153]: I0702 07:54:35.699727 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-cni-bin-dir\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700001 kubelet[2153]: I0702 07:54:35.699780 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ppsbg\" (UniqueName: \"kubernetes.io/projected/70386587-b24b-4038-867d-2c4b0f96fc73-kube-api-access-ppsbg\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700001 kubelet[2153]: I0702 07:54:35.699812 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-flexvol-driver-host\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700001 kubelet[2153]: I0702 07:54:35.699847 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/70386587-b24b-4038-867d-2c4b0f96fc73-tigera-ca-bundle\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700001 kubelet[2153]: I0702 07:54:35.699912 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-cni-log-dir\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700292 kubelet[2153]: I0702 07:54:35.699973 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-cni-net-dir\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700292 kubelet[2153]: I0702 07:54:35.700007 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/70386587-b24b-4038-867d-2c4b0f96fc73-node-certs\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700292 kubelet[2153]: I0702 07:54:35.700042 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-var-run-calico\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700292 kubelet[2153]: I0702 07:54:35.700098 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-xtables-lock\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.700292 kubelet[2153]: I0702 07:54:35.700146 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/70386587-b24b-4038-867d-2c4b0f96fc73-var-lib-calico\") pod \"calico-node-cpfh9\" (UID: \"70386587-b24b-4038-867d-2c4b0f96fc73\") " pod="calico-system/calico-node-cpfh9" Jul 2 07:54:35.752681 kubelet[2153]: I0702 07:54:35.752599 2153 topology_manager.go:215] "Topology Admit Handler" podUID="1e68b892-4c7b-4e50-9b51-2c98308fc107" podNamespace="calico-system" podName="csi-node-driver-928qd" Jul 2 07:54:35.753040 kubelet[2153]: E0702 07:54:35.753015 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-928qd" podUID="1e68b892-4c7b-4e50-9b51-2c98308fc107" Jul 2 07:54:35.800563 kubelet[2153]: I0702 07:54:35.800516 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1e68b892-4c7b-4e50-9b51-2c98308fc107-kubelet-dir\") pod \"csi-node-driver-928qd\" (UID: \"1e68b892-4c7b-4e50-9b51-2c98308fc107\") " pod="calico-system/csi-node-driver-928qd" Jul 2 07:54:35.800813 kubelet[2153]: I0702 07:54:35.800701 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1e68b892-4c7b-4e50-9b51-2c98308fc107-varrun\") pod \"csi-node-driver-928qd\" (UID: \"1e68b892-4c7b-4e50-9b51-2c98308fc107\") " pod="calico-system/csi-node-driver-928qd" Jul 2 07:54:35.800907 kubelet[2153]: I0702 07:54:35.800848 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sp2zb\" (UniqueName: \"kubernetes.io/projected/1e68b892-4c7b-4e50-9b51-2c98308fc107-kube-api-access-sp2zb\") pod \"csi-node-driver-928qd\" (UID: \"1e68b892-4c7b-4e50-9b51-2c98308fc107\") " pod="calico-system/csi-node-driver-928qd" Jul 2 07:54:35.800993 kubelet[2153]: I0702 07:54:35.800932 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1e68b892-4c7b-4e50-9b51-2c98308fc107-socket-dir\") pod \"csi-node-driver-928qd\" (UID: \"1e68b892-4c7b-4e50-9b51-2c98308fc107\") " pod="calico-system/csi-node-driver-928qd" Jul 2 07:54:35.800993 kubelet[2153]: I0702 07:54:35.800991 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1e68b892-4c7b-4e50-9b51-2c98308fc107-registration-dir\") pod \"csi-node-driver-928qd\" (UID: \"1e68b892-4c7b-4e50-9b51-2c98308fc107\") " pod="calico-system/csi-node-driver-928qd" Jul 2 07:54:35.804427 kubelet[2153]: E0702 07:54:35.804006 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.804427 kubelet[2153]: W0702 07:54:35.804038 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.804427 kubelet[2153]: E0702 07:54:35.804097 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.814142 kubelet[2153]: E0702 07:54:35.814111 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.814386 kubelet[2153]: W0702 07:54:35.814351 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.814515 kubelet[2153]: E0702 07:54:35.814500 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.826990 env[1235]: time="2024-07-02T07:54:35.826927247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5dff75c45b-gq6xw,Uid:39f4a41e-f78d-4aed-84b6-759eb03dea11,Namespace:calico-system,Attempt:0,}" Jul 2 07:54:35.845731 kubelet[2153]: E0702 07:54:35.845700 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.845970 kubelet[2153]: W0702 07:54:35.845773 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.845970 kubelet[2153]: E0702 07:54:35.845839 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.909456 kubelet[2153]: E0702 07:54:35.902149 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.909456 kubelet[2153]: W0702 07:54:35.902178 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.909456 kubelet[2153]: E0702 07:54:35.902218 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.909456 kubelet[2153]: E0702 07:54:35.902579 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.909456 kubelet[2153]: W0702 07:54:35.902596 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.909456 kubelet[2153]: E0702 07:54:35.902622 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.909456 kubelet[2153]: E0702 07:54:35.902914 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.909456 kubelet[2153]: W0702 07:54:35.902925 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.909456 kubelet[2153]: E0702 07:54:35.902942 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.909456 kubelet[2153]: E0702 07:54:35.903226 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.910184 kubelet[2153]: W0702 07:54:35.903239 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.910184 kubelet[2153]: E0702 07:54:35.903258 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.910184 kubelet[2153]: E0702 07:54:35.903585 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.910184 kubelet[2153]: W0702 07:54:35.903599 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.910184 kubelet[2153]: E0702 07:54:35.903620 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.910184 kubelet[2153]: E0702 07:54:35.904064 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.910184 kubelet[2153]: W0702 07:54:35.904084 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.910184 kubelet[2153]: E0702 07:54:35.904106 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.910184 kubelet[2153]: E0702 07:54:35.904401 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.910184 kubelet[2153]: W0702 07:54:35.904417 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.910740 kubelet[2153]: E0702 07:54:35.904437 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.910740 kubelet[2153]: E0702 07:54:35.904726 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.910740 kubelet[2153]: W0702 07:54:35.904739 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.910740 kubelet[2153]: E0702 07:54:35.904758 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.910740 kubelet[2153]: E0702 07:54:35.905099 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.910740 kubelet[2153]: W0702 07:54:35.905121 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.910740 kubelet[2153]: E0702 07:54:35.905142 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.910740 kubelet[2153]: E0702 07:54:35.905439 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.910740 kubelet[2153]: W0702 07:54:35.905452 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.910740 kubelet[2153]: E0702 07:54:35.905475 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.911273 kubelet[2153]: E0702 07:54:35.905753 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.911273 kubelet[2153]: W0702 07:54:35.905765 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.911273 kubelet[2153]: E0702 07:54:35.905785 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.911273 kubelet[2153]: E0702 07:54:35.906049 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.911273 kubelet[2153]: W0702 07:54:35.906058 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.911273 kubelet[2153]: E0702 07:54:35.906078 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.911273 kubelet[2153]: E0702 07:54:35.906350 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.911273 kubelet[2153]: W0702 07:54:35.906362 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.911273 kubelet[2153]: E0702 07:54:35.906380 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.911273 kubelet[2153]: E0702 07:54:35.908485 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.911819 kubelet[2153]: W0702 07:54:35.908499 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.911819 kubelet[2153]: E0702 07:54:35.908680 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.911819 kubelet[2153]: E0702 07:54:35.909169 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.911819 kubelet[2153]: W0702 07:54:35.909182 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.911819 kubelet[2153]: E0702 07:54:35.909209 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.911819 kubelet[2153]: E0702 07:54:35.909615 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.911819 kubelet[2153]: W0702 07:54:35.909628 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.911819 kubelet[2153]: E0702 07:54:35.909654 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.911819 kubelet[2153]: E0702 07:54:35.910010 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.911819 kubelet[2153]: W0702 07:54:35.910023 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.912403 kubelet[2153]: E0702 07:54:35.910148 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.912403 kubelet[2153]: E0702 07:54:35.910332 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.912403 kubelet[2153]: W0702 07:54:35.910344 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.912403 kubelet[2153]: E0702 07:54:35.910455 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.912403 kubelet[2153]: E0702 07:54:35.910637 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.912403 kubelet[2153]: W0702 07:54:35.910648 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.912403 kubelet[2153]: E0702 07:54:35.910671 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.912403 kubelet[2153]: E0702 07:54:35.911222 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.912403 kubelet[2153]: W0702 07:54:35.911235 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.912403 kubelet[2153]: E0702 07:54:35.911262 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.912958 kubelet[2153]: E0702 07:54:35.911541 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.912958 kubelet[2153]: W0702 07:54:35.911553 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.912958 kubelet[2153]: E0702 07:54:35.911576 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.912958 kubelet[2153]: E0702 07:54:35.911934 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.912958 kubelet[2153]: W0702 07:54:35.911948 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.912958 kubelet[2153]: E0702 07:54:35.912061 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.912958 kubelet[2153]: E0702 07:54:35.912262 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.912958 kubelet[2153]: W0702 07:54:35.912281 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.912958 kubelet[2153]: E0702 07:54:35.912300 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.912958 kubelet[2153]: E0702 07:54:35.912551 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.913447 kubelet[2153]: W0702 07:54:35.912562 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.913447 kubelet[2153]: E0702 07:54:35.912579 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.913447 kubelet[2153]: E0702 07:54:35.912910 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.913447 kubelet[2153]: W0702 07:54:35.912924 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.913447 kubelet[2153]: E0702 07:54:35.912942 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.921264 env[1235]: time="2024-07-02T07:54:35.921208052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cpfh9,Uid:70386587-b24b-4038-867d-2c4b0f96fc73,Namespace:calico-system,Attempt:0,}" Jul 2 07:54:35.931130 env[1235]: time="2024-07-02T07:54:35.930432815Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:35.931130 env[1235]: time="2024-07-02T07:54:35.930502457Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:35.931130 env[1235]: time="2024-07-02T07:54:35.930521207Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:35.931552 env[1235]: time="2024-07-02T07:54:35.931502380Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11fe2f692a9d82c516fb24fa678b314fb29dc005c482905cd33ace5466ea0eee pid=2530 runtime=io.containerd.runc.v2 Jul 2 07:54:35.945223 kubelet[2153]: E0702 07:54:35.945187 2153 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:35.945223 kubelet[2153]: W0702 07:54:35.945217 2153 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:35.945476 kubelet[2153]: E0702 07:54:35.945250 2153 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:35.966206 systemd[1]: Started cri-containerd-11fe2f692a9d82c516fb24fa678b314fb29dc005c482905cd33ace5466ea0eee.scope. Jul 2 07:54:35.986524 env[1235]: time="2024-07-02T07:54:35.984730045Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:35.986524 env[1235]: time="2024-07-02T07:54:35.984827706Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:35.986524 env[1235]: time="2024-07-02T07:54:35.984865496Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:35.986524 env[1235]: time="2024-07-02T07:54:35.986258498Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6 pid=2583 runtime=io.containerd.runc.v2 Jul 2 07:54:36.014962 systemd[1]: Started cri-containerd-168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6.scope. Jul 2 07:54:36.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.024000 audit: BPF prog-id=124 op=LOAD Jul 2 07:54:36.025000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.025000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2530 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666532663639326139643832633531366662323466613637386233 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2530 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666532663639326139643832633531366662323466613637386233 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.026000 audit: BPF prog-id=125 op=LOAD Jul 2 07:54:36.026000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003b0b00 items=0 ppid=2530 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666532663639326139643832633531366662323466613637386233 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.028000 audit: BPF prog-id=126 op=LOAD Jul 2 07:54:36.028000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003b0b48 items=0 ppid=2530 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666532663639326139643832633531366662323466613637386233 Jul 2 07:54:36.030000 audit: BPF prog-id=126 op=UNLOAD Jul 2 07:54:36.030000 audit: BPF prog-id=125 op=UNLOAD Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.030000 audit: BPF prog-id=127 op=LOAD Jul 2 07:54:36.030000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003b0f58 items=0 ppid=2530 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666532663639326139643832633531366662323466613637386233 Jul 2 07:54:36.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.072000 audit: BPF prog-id=128 op=LOAD Jul 2 07:54:36.073000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.073000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2583 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383739306233363333353339646231643539326233663130623763 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2583 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383739306233363333353339646231643539326233663130623763 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.074000 audit: BPF prog-id=129 op=LOAD Jul 2 07:54:36.074000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000327d00 items=0 ppid=2583 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383739306233363333353339646231643539326233663130623763 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.076000 audit: BPF prog-id=130 op=LOAD Jul 2 07:54:36.076000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000327d48 items=0 ppid=2583 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383739306233363333353339646231643539326233663130623763 Jul 2 07:54:36.077000 audit: BPF prog-id=130 op=UNLOAD Jul 2 07:54:36.077000 audit: BPF prog-id=129 op=UNLOAD Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.077000 audit: BPF prog-id=131 op=LOAD Jul 2 07:54:36.077000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037e158 items=0 ppid=2583 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383739306233363333353339646231643539326233663130623763 Jul 2 07:54:36.122232 env[1235]: time="2024-07-02T07:54:36.122135646Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cpfh9,Uid:70386587-b24b-4038-867d-2c4b0f96fc73,Namespace:calico-system,Attempt:0,} returns sandbox id \"168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6\"" Jul 2 07:54:36.125188 env[1235]: time="2024-07-02T07:54:36.125144660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:54:36.232470 env[1235]: time="2024-07-02T07:54:36.232312844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5dff75c45b-gq6xw,Uid:39f4a41e-f78d-4aed-84b6-759eb03dea11,Namespace:calico-system,Attempt:0,} returns sandbox id \"11fe2f692a9d82c516fb24fa678b314fb29dc005c482905cd33ace5466ea0eee\"" Jul 2 07:54:36.491000 audit[2633]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:36.491000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcacb13eb0 a2=0 a3=7ffcacb13e9c items=0 ppid=2324 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:36.494000 audit[2633]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:36.494000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcacb13eb0 a2=0 a3=0 items=0 ppid=2324 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:37.264277 env[1235]: time="2024-07-02T07:54:37.264232468Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.268825 env[1235]: time="2024-07-02T07:54:37.268781434Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.272429 env[1235]: time="2024-07-02T07:54:37.272392011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.275249 env[1235]: time="2024-07-02T07:54:37.275212875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:37.276387 env[1235]: time="2024-07-02T07:54:37.276334517Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:54:37.278469 env[1235]: time="2024-07-02T07:54:37.278424658Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 07:54:37.280485 env[1235]: time="2024-07-02T07:54:37.280442276Z" level=info msg="CreateContainer within sandbox \"168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:54:37.317058 env[1235]: time="2024-07-02T07:54:37.316994075Z" level=info msg="CreateContainer within sandbox \"168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe\"" Jul 2 07:54:37.320822 env[1235]: time="2024-07-02T07:54:37.320752931Z" level=info msg="StartContainer for \"750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe\"" Jul 2 07:54:37.375269 systemd[1]: Started cri-containerd-750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe.scope. Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff8fa2c1488 items=0 ppid=2583 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306432393132326237306634653434353330366131303662623262 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit: BPF prog-id=132 op=LOAD Jul 2 07:54:37.403000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000261b98 items=0 ppid=2583 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306432393132326237306634653434353330366131303662623262 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit: BPF prog-id=133 op=LOAD Jul 2 07:54:37.403000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000261be8 items=0 ppid=2583 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306432393132326237306634653434353330366131303662623262 Jul 2 07:54:37.403000 audit: BPF prog-id=133 op=UNLOAD Jul 2 07:54:37.403000 audit: BPF prog-id=132 op=UNLOAD Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.403000 audit: BPF prog-id=134 op=LOAD Jul 2 07:54:37.403000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000261c78 items=0 ppid=2583 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306432393132326237306634653434353330366131303662623262 Jul 2 07:54:37.434801 env[1235]: time="2024-07-02T07:54:37.434740893Z" level=info msg="StartContainer for \"750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe\" returns successfully" Jul 2 07:54:37.452563 systemd[1]: cri-containerd-750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe.scope: Deactivated successfully. Jul 2 07:54:37.456000 audit: BPF prog-id=134 op=UNLOAD Jul 2 07:54:37.708218 systemd[1]: run-containerd-runc-k8s.io-750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe-runc.XKkv3R.mount: Deactivated successfully. Jul 2 07:54:37.708416 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe-rootfs.mount: Deactivated successfully. Jul 2 07:54:37.807785 env[1235]: time="2024-07-02T07:54:37.807710787Z" level=info msg="shim disconnected" id=750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe Jul 2 07:54:37.807785 env[1235]: time="2024-07-02T07:54:37.807785423Z" level=warning msg="cleaning up after shim disconnected" id=750d29122b70f4e445306a106bb2b4d48defde4c58eaedc7c352e548a8293ebe namespace=k8s.io Jul 2 07:54:37.808136 env[1235]: time="2024-07-02T07:54:37.807799742Z" level=info msg="cleaning up dead shim" Jul 2 07:54:37.829014 env[1235]: time="2024-07-02T07:54:37.828960137Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:54:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2680 runtime=io.containerd.runc.v2\n" Jul 2 07:54:37.973363 kubelet[2153]: E0702 07:54:37.972606 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-928qd" podUID="1e68b892-4c7b-4e50-9b51-2c98308fc107" Jul 2 07:54:39.437142 env[1235]: time="2024-07-02T07:54:39.437083552Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:39.441250 env[1235]: time="2024-07-02T07:54:39.441184210Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:39.443831 env[1235]: time="2024-07-02T07:54:39.443789245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:39.447332 env[1235]: time="2024-07-02T07:54:39.447290173Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:39.448364 env[1235]: time="2024-07-02T07:54:39.448307398Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 07:54:39.451129 env[1235]: time="2024-07-02T07:54:39.451093446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:54:39.480780 env[1235]: time="2024-07-02T07:54:39.480728518Z" level=info msg="CreateContainer within sandbox \"11fe2f692a9d82c516fb24fa678b314fb29dc005c482905cd33ace5466ea0eee\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 07:54:39.501605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2890288851.mount: Deactivated successfully. Jul 2 07:54:39.510162 env[1235]: time="2024-07-02T07:54:39.510087962Z" level=info msg="CreateContainer within sandbox \"11fe2f692a9d82c516fb24fa678b314fb29dc005c482905cd33ace5466ea0eee\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2ca3d71ae57ba2345fce79d2efae435456ef96788fac2db3d1871a2b6bbec6e0\"" Jul 2 07:54:39.510934 env[1235]: time="2024-07-02T07:54:39.510874438Z" level=info msg="StartContainer for \"2ca3d71ae57ba2345fce79d2efae435456ef96788fac2db3d1871a2b6bbec6e0\"" Jul 2 07:54:39.552287 systemd[1]: Started cri-containerd-2ca3d71ae57ba2345fce79d2efae435456ef96788fac2db3d1871a2b6bbec6e0.scope. Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.588000 audit: BPF prog-id=135 op=LOAD Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2530 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:39.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613364373161653537626132333435666365373964326566616534 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2530 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:39.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613364373161653537626132333435666365373964326566616534 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit: BPF prog-id=136 op=LOAD Jul 2 07:54:39.589000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e5a10 items=0 ppid=2530 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:39.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613364373161653537626132333435666365373964326566616534 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit: BPF prog-id=137 op=LOAD Jul 2 07:54:39.589000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e5a58 items=0 ppid=2530 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:39.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613364373161653537626132333435666365373964326566616534 Jul 2 07:54:39.589000 audit: BPF prog-id=137 op=UNLOAD Jul 2 07:54:39.589000 audit: BPF prog-id=136 op=UNLOAD Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:39.589000 audit: BPF prog-id=138 op=LOAD Jul 2 07:54:39.589000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e5e68 items=0 ppid=2530 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:39.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613364373161653537626132333435666365373964326566616534 Jul 2 07:54:39.643936 env[1235]: time="2024-07-02T07:54:39.643852959Z" level=info msg="StartContainer for \"2ca3d71ae57ba2345fce79d2efae435456ef96788fac2db3d1871a2b6bbec6e0\" returns successfully" Jul 2 07:54:39.972679 kubelet[2153]: E0702 07:54:39.972637 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-928qd" podUID="1e68b892-4c7b-4e50-9b51-2c98308fc107" Jul 2 07:54:40.126151 kubelet[2153]: I0702 07:54:40.126097 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5dff75c45b-gq6xw" podStartSLOduration=1.9152413670000001 podCreationTimestamp="2024-07-02 07:54:35 +0000 UTC" firstStartedPulling="2024-07-02 07:54:36.238824796 +0000 UTC m=+19.588861055" lastFinishedPulling="2024-07-02 07:54:39.449631419 +0000 UTC m=+22.799667670" observedRunningTime="2024-07-02 07:54:40.124453368 +0000 UTC m=+23.474489663" watchObservedRunningTime="2024-07-02 07:54:40.126047982 +0000 UTC m=+23.476084250" Jul 2 07:54:40.191000 audit[2742]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:40.191000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdfc4b1990 a2=0 a3=7ffdfc4b197c items=0 ppid=2324 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:40.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:40.196000 audit[2742]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:40.196000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdfc4b1990 a2=0 a3=7ffdfc4b197c items=0 ppid=2324 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:40.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:41.975590 kubelet[2153]: E0702 07:54:41.973367 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-928qd" podUID="1e68b892-4c7b-4e50-9b51-2c98308fc107" Jul 2 07:54:43.756383 env[1235]: time="2024-07-02T07:54:43.756314302Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:43.759152 env[1235]: time="2024-07-02T07:54:43.759103445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:43.761473 env[1235]: time="2024-07-02T07:54:43.761428132Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:43.763842 env[1235]: time="2024-07-02T07:54:43.763800648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:43.764593 env[1235]: time="2024-07-02T07:54:43.764549063Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:54:43.769536 env[1235]: time="2024-07-02T07:54:43.769475310Z" level=info msg="CreateContainer within sandbox \"168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:54:43.793424 env[1235]: time="2024-07-02T07:54:43.793356809Z" level=info msg="CreateContainer within sandbox \"168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf\"" Jul 2 07:54:43.796273 env[1235]: time="2024-07-02T07:54:43.793941824Z" level=info msg="StartContainer for \"0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf\"" Jul 2 07:54:43.833495 systemd[1]: run-containerd-runc-k8s.io-0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf-runc.KQEX8R.mount: Deactivated successfully. Jul 2 07:54:43.840098 systemd[1]: Started cri-containerd-0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf.scope. Jul 2 07:54:43.900934 kernel: kauditd_printk_skb: 229 callbacks suppressed Jul 2 07:54:43.901150 kernel: audit: type=1400 audit(1719906883.873:1004): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7faed2fc8508 items=0 ppid=2583 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:43.935970 kernel: audit: type=1300 audit(1719906883.873:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7faed2fc8508 items=0 ppid=2583 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:43.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063666137306231353465313832323138366431663137643830306136 Jul 2 07:54:43.987552 kernel: audit: type=1327 audit(1719906883.873:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063666137306231353465313832323138366431663137643830306136 Jul 2 07:54:43.987674 kernel: audit: type=1400 audit(1719906883.873:1005): avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.987852 kubelet[2153]: E0702 07:54:43.972715 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-928qd" podUID="1e68b892-4c7b-4e50-9b51-2c98308fc107" Jul 2 07:54:43.990469 env[1235]: time="2024-07-02T07:54:43.989250982Z" level=info msg="StartContainer for \"0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf\" returns successfully" Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.032159 kernel: audit: type=1400 audit(1719906883.873:1005): avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.032342 kernel: audit: type=1400 audit(1719906883.873:1005): avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.032398 kernel: audit: type=1400 audit(1719906883.873:1005): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.074355 kernel: audit: type=1400 audit(1719906883.873:1005): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.074521 kernel: audit: type=1400 audit(1719906883.873:1005): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:44.116409 kernel: audit: type=1400 audit(1719906883.873:1005): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.873000 audit: BPF prog-id=139 op=LOAD Jul 2 07:54:43.873000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028ce48 items=0 ppid=2583 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:43.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063666137306231353465313832323138366431663137643830306136 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit: BPF prog-id=140 op=LOAD Jul 2 07:54:43.900000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028ce98 items=0 ppid=2583 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:43.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063666137306231353465313832323138366431663137643830306136 Jul 2 07:54:43.900000 audit: BPF prog-id=140 op=UNLOAD Jul 2 07:54:43.900000 audit: BPF prog-id=139 op=UNLOAD Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:43.900000 audit: BPF prog-id=141 op=LOAD Jul 2 07:54:43.900000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028cf28 items=0 ppid=2583 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:43.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063666137306231353465313832323138366431663137643830306136 Jul 2 07:54:44.760445 env[1235]: time="2024-07-02T07:54:44.760358723Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:54:44.763702 systemd[1]: cri-containerd-0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf.scope: Deactivated successfully. Jul 2 07:54:44.767000 audit: BPF prog-id=141 op=UNLOAD Jul 2 07:54:44.784224 kubelet[2153]: I0702 07:54:44.784184 2153 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Jul 2 07:54:44.801695 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf-rootfs.mount: Deactivated successfully. Jul 2 07:54:44.828048 kubelet[2153]: I0702 07:54:44.827994 2153 topology_manager.go:215] "Topology Admit Handler" podUID="af28b2ce-db18-4892-abe4-8757652fa27c" podNamespace="kube-system" podName="coredns-5dd5756b68-vknkw" Jul 2 07:54:44.842152 systemd[1]: Created slice kubepods-burstable-podaf28b2ce_db18_4892_abe4_8757652fa27c.slice. Jul 2 07:54:44.843415 kubelet[2153]: I0702 07:54:44.843383 2153 topology_manager.go:215] "Topology Admit Handler" podUID="42d413e6-f6b6-45e1-aeb3-5b2079fd6746" podNamespace="calico-system" podName="calico-kube-controllers-668d55d57d-qdjvj" Jul 2 07:54:44.848688 kubelet[2153]: I0702 07:54:44.848655 2153 topology_manager.go:215] "Topology Admit Handler" podUID="9e97620e-d188-4284-b33f-e2b87abc8e79" podNamespace="kube-system" podName="coredns-5dd5756b68-fljks" Jul 2 07:54:44.853488 systemd[1]: Created slice kubepods-besteffort-pod42d413e6_f6b6_45e1_aeb3_5b2079fd6746.slice. Jul 2 07:54:44.862520 systemd[1]: Created slice kubepods-burstable-pod9e97620e_d188_4284_b33f_e2b87abc8e79.slice. Jul 2 07:54:44.975605 kubelet[2153]: I0702 07:54:44.975541 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/42d413e6-f6b6-45e1-aeb3-5b2079fd6746-tigera-ca-bundle\") pod \"calico-kube-controllers-668d55d57d-qdjvj\" (UID: \"42d413e6-f6b6-45e1-aeb3-5b2079fd6746\") " pod="calico-system/calico-kube-controllers-668d55d57d-qdjvj" Jul 2 07:54:44.976408 kubelet[2153]: I0702 07:54:44.976008 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9e97620e-d188-4284-b33f-e2b87abc8e79-config-volume\") pod \"coredns-5dd5756b68-fljks\" (UID: \"9e97620e-d188-4284-b33f-e2b87abc8e79\") " pod="kube-system/coredns-5dd5756b68-fljks" Jul 2 07:54:44.976736 kubelet[2153]: I0702 07:54:44.976715 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nk76g\" (UniqueName: \"kubernetes.io/projected/42d413e6-f6b6-45e1-aeb3-5b2079fd6746-kube-api-access-nk76g\") pod \"calico-kube-controllers-668d55d57d-qdjvj\" (UID: \"42d413e6-f6b6-45e1-aeb3-5b2079fd6746\") " pod="calico-system/calico-kube-controllers-668d55d57d-qdjvj" Jul 2 07:54:44.977339 kubelet[2153]: I0702 07:54:44.977308 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n7v9f\" (UniqueName: \"kubernetes.io/projected/af28b2ce-db18-4892-abe4-8757652fa27c-kube-api-access-n7v9f\") pod \"coredns-5dd5756b68-vknkw\" (UID: \"af28b2ce-db18-4892-abe4-8757652fa27c\") " pod="kube-system/coredns-5dd5756b68-vknkw" Jul 2 07:54:44.977469 kubelet[2153]: I0702 07:54:44.977365 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-64dc9\" (UniqueName: \"kubernetes.io/projected/9e97620e-d188-4284-b33f-e2b87abc8e79-kube-api-access-64dc9\") pod \"coredns-5dd5756b68-fljks\" (UID: \"9e97620e-d188-4284-b33f-e2b87abc8e79\") " pod="kube-system/coredns-5dd5756b68-fljks" Jul 2 07:54:44.977469 kubelet[2153]: I0702 07:54:44.977403 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/af28b2ce-db18-4892-abe4-8757652fa27c-config-volume\") pod \"coredns-5dd5756b68-vknkw\" (UID: \"af28b2ce-db18-4892-abe4-8757652fa27c\") " pod="kube-system/coredns-5dd5756b68-vknkw" Jul 2 07:54:45.150140 env[1235]: time="2024-07-02T07:54:45.150082236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-vknkw,Uid:af28b2ce-db18-4892-abe4-8757652fa27c,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:45.159539 env[1235]: time="2024-07-02T07:54:45.159476312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-668d55d57d-qdjvj,Uid:42d413e6-f6b6-45e1-aeb3-5b2079fd6746,Namespace:calico-system,Attempt:0,}" Jul 2 07:54:45.168077 env[1235]: time="2024-07-02T07:54:45.168025423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fljks,Uid:9e97620e-d188-4284-b33f-e2b87abc8e79,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:45.820577 env[1235]: time="2024-07-02T07:54:45.820498916Z" level=info msg="shim disconnected" id=0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf Jul 2 07:54:45.820577 env[1235]: time="2024-07-02T07:54:45.820559923Z" level=warning msg="cleaning up after shim disconnected" id=0cfa70b154e1822186d1f17d800a6cc4458f695c0bbca29e4d5220df4d96aebf namespace=k8s.io Jul 2 07:54:45.820577 env[1235]: time="2024-07-02T07:54:45.820586427Z" level=info msg="cleaning up dead shim" Jul 2 07:54:45.833818 env[1235]: time="2024-07-02T07:54:45.833764849Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:54:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2793 runtime=io.containerd.runc.v2\n" Jul 2 07:54:45.981362 systemd[1]: Created slice kubepods-besteffort-pod1e68b892_4c7b_4e50_9b51_2c98308fc107.slice. Jul 2 07:54:45.987244 env[1235]: time="2024-07-02T07:54:45.987189764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-928qd,Uid:1e68b892-4c7b-4e50-9b51-2c98308fc107,Namespace:calico-system,Attempt:0,}" Jul 2 07:54:46.049007 env[1235]: time="2024-07-02T07:54:46.048891391Z" level=error msg="Failed to destroy network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.049584 env[1235]: time="2024-07-02T07:54:46.049495956Z" level=error msg="encountered an error cleaning up failed sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.049734 env[1235]: time="2024-07-02T07:54:46.049616270Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fljks,Uid:9e97620e-d188-4284-b33f-e2b87abc8e79,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.050315 kubelet[2153]: E0702 07:54:46.050054 2153 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.050315 kubelet[2153]: E0702 07:54:46.050142 2153 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-fljks" Jul 2 07:54:46.050315 kubelet[2153]: E0702 07:54:46.050184 2153 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-fljks" Jul 2 07:54:46.051107 kubelet[2153]: E0702 07:54:46.050277 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-fljks_kube-system(9e97620e-d188-4284-b33f-e2b87abc8e79)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-fljks_kube-system(9e97620e-d188-4284-b33f-e2b87abc8e79)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-fljks" podUID="9e97620e-d188-4284-b33f-e2b87abc8e79" Jul 2 07:54:46.083992 env[1235]: time="2024-07-02T07:54:46.083803515Z" level=error msg="Failed to destroy network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.085143 env[1235]: time="2024-07-02T07:54:46.085053878Z" level=error msg="encountered an error cleaning up failed sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.087081 env[1235]: time="2024-07-02T07:54:46.085189148Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-vknkw,Uid:af28b2ce-db18-4892-abe4-8757652fa27c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.087205 kubelet[2153]: E0702 07:54:46.085493 2153 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.087205 kubelet[2153]: E0702 07:54:46.085557 2153 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-vknkw" Jul 2 07:54:46.087205 kubelet[2153]: E0702 07:54:46.085590 2153 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-vknkw" Jul 2 07:54:46.087410 kubelet[2153]: E0702 07:54:46.085666 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-vknkw_kube-system(af28b2ce-db18-4892-abe4-8757652fa27c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-vknkw_kube-system(af28b2ce-db18-4892-abe4-8757652fa27c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-vknkw" podUID="af28b2ce-db18-4892-abe4-8757652fa27c" Jul 2 07:54:46.114337 env[1235]: time="2024-07-02T07:54:46.114260532Z" level=error msg="Failed to destroy network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.114774 env[1235]: time="2024-07-02T07:54:46.114719452Z" level=error msg="encountered an error cleaning up failed sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.114922 env[1235]: time="2024-07-02T07:54:46.114803271Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-668d55d57d-qdjvj,Uid:42d413e6-f6b6-45e1-aeb3-5b2079fd6746,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.115175 kubelet[2153]: E0702 07:54:46.115144 2153 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.115272 kubelet[2153]: E0702 07:54:46.115211 2153 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-668d55d57d-qdjvj" Jul 2 07:54:46.115272 kubelet[2153]: E0702 07:54:46.115253 2153 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-668d55d57d-qdjvj" Jul 2 07:54:46.115387 kubelet[2153]: E0702 07:54:46.115332 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-668d55d57d-qdjvj_calico-system(42d413e6-f6b6-45e1-aeb3-5b2079fd6746)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-668d55d57d-qdjvj_calico-system(42d413e6-f6b6-45e1-aeb3-5b2079fd6746)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-668d55d57d-qdjvj" podUID="42d413e6-f6b6-45e1-aeb3-5b2079fd6746" Jul 2 07:54:46.143086 kubelet[2153]: I0702 07:54:46.143044 2153 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:54:46.144189 env[1235]: time="2024-07-02T07:54:46.144118856Z" level=info msg="StopPodSandbox for \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\"" Jul 2 07:54:46.162655 env[1235]: time="2024-07-02T07:54:46.161194191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:54:46.163228 env[1235]: time="2024-07-02T07:54:46.163158616Z" level=error msg="Failed to destroy network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.168811 env[1235]: time="2024-07-02T07:54:46.168731317Z" level=error msg="encountered an error cleaning up failed sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.169388 env[1235]: time="2024-07-02T07:54:46.168845621Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-928qd,Uid:1e68b892-4c7b-4e50-9b51-2c98308fc107,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.173402 kubelet[2153]: E0702 07:54:46.173373 2153 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.174189 kubelet[2153]: E0702 07:54:46.174161 2153 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-928qd" Jul 2 07:54:46.174374 kubelet[2153]: E0702 07:54:46.174358 2153 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-928qd" Jul 2 07:54:46.174571 kubelet[2153]: E0702 07:54:46.174554 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-928qd_calico-system(1e68b892-4c7b-4e50-9b51-2c98308fc107)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-928qd_calico-system(1e68b892-4c7b-4e50-9b51-2c98308fc107)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-928qd" podUID="1e68b892-4c7b-4e50-9b51-2c98308fc107" Jul 2 07:54:46.183363 kubelet[2153]: I0702 07:54:46.183338 2153 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:54:46.186160 env[1235]: time="2024-07-02T07:54:46.186072758Z" level=info msg="StopPodSandbox for \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\"" Jul 2 07:54:46.188781 kubelet[2153]: I0702 07:54:46.188541 2153 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:54:46.191289 env[1235]: time="2024-07-02T07:54:46.190724311Z" level=info msg="StopPodSandbox for \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\"" Jul 2 07:54:46.276599 env[1235]: time="2024-07-02T07:54:46.276493905Z" level=error msg="StopPodSandbox for \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\" failed" error="failed to destroy network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.276959 kubelet[2153]: E0702 07:54:46.276927 2153 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:54:46.277119 kubelet[2153]: E0702 07:54:46.277025 2153 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75"} Jul 2 07:54:46.277119 kubelet[2153]: E0702 07:54:46.277083 2153 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"42d413e6-f6b6-45e1-aeb3-5b2079fd6746\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:54:46.277301 kubelet[2153]: E0702 07:54:46.277128 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"42d413e6-f6b6-45e1-aeb3-5b2079fd6746\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-668d55d57d-qdjvj" podUID="42d413e6-f6b6-45e1-aeb3-5b2079fd6746" Jul 2 07:54:46.278600 env[1235]: time="2024-07-02T07:54:46.278531738Z" level=error msg="StopPodSandbox for \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\" failed" error="failed to destroy network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.279075 kubelet[2153]: E0702 07:54:46.279037 2153 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:54:46.279194 kubelet[2153]: E0702 07:54:46.279084 2153 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1"} Jul 2 07:54:46.279194 kubelet[2153]: E0702 07:54:46.279138 2153 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9e97620e-d188-4284-b33f-e2b87abc8e79\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:54:46.279194 kubelet[2153]: E0702 07:54:46.279181 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9e97620e-d188-4284-b33f-e2b87abc8e79\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-fljks" podUID="9e97620e-d188-4284-b33f-e2b87abc8e79" Jul 2 07:54:46.290025 env[1235]: time="2024-07-02T07:54:46.289959439Z" level=error msg="StopPodSandbox for \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\" failed" error="failed to destroy network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:46.290274 kubelet[2153]: E0702 07:54:46.290222 2153 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:54:46.290274 kubelet[2153]: E0702 07:54:46.290269 2153 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7"} Jul 2 07:54:46.290543 kubelet[2153]: E0702 07:54:46.290326 2153 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"af28b2ce-db18-4892-abe4-8757652fa27c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:54:46.290543 kubelet[2153]: E0702 07:54:46.290372 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"af28b2ce-db18-4892-abe4-8757652fa27c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-vknkw" podUID="af28b2ce-db18-4892-abe4-8757652fa27c" Jul 2 07:54:46.841841 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb-shm.mount: Deactivated successfully. Jul 2 07:54:46.841985 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75-shm.mount: Deactivated successfully. Jul 2 07:54:46.842138 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1-shm.mount: Deactivated successfully. Jul 2 07:54:46.842247 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7-shm.mount: Deactivated successfully. Jul 2 07:54:47.206790 kubelet[2153]: I0702 07:54:47.202809 2153 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:54:47.208790 env[1235]: time="2024-07-02T07:54:47.208739216Z" level=info msg="StopPodSandbox for \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\"" Jul 2 07:54:47.303192 env[1235]: time="2024-07-02T07:54:47.303112108Z" level=error msg="StopPodSandbox for \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\" failed" error="failed to destroy network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:47.303968 kubelet[2153]: E0702 07:54:47.303726 2153 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:54:47.303968 kubelet[2153]: E0702 07:54:47.303789 2153 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb"} Jul 2 07:54:47.303968 kubelet[2153]: E0702 07:54:47.303853 2153 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1e68b892-4c7b-4e50-9b51-2c98308fc107\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:54:47.304565 kubelet[2153]: E0702 07:54:47.304464 2153 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1e68b892-4c7b-4e50-9b51-2c98308fc107\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-928qd" podUID="1e68b892-4c7b-4e50-9b51-2c98308fc107" Jul 2 07:54:52.354536 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount313989405.mount: Deactivated successfully. Jul 2 07:54:52.387956 env[1235]: time="2024-07-02T07:54:52.387895876Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:52.390493 env[1235]: time="2024-07-02T07:54:52.390450115Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:52.392540 env[1235]: time="2024-07-02T07:54:52.392504776Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:52.394520 env[1235]: time="2024-07-02T07:54:52.394476874Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:52.395303 env[1235]: time="2024-07-02T07:54:52.395253270Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:54:52.421135 env[1235]: time="2024-07-02T07:54:52.421085237Z" level=info msg="CreateContainer within sandbox \"168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:54:52.445361 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount677389886.mount: Deactivated successfully. Jul 2 07:54:52.450004 env[1235]: time="2024-07-02T07:54:52.449941044Z" level=info msg="CreateContainer within sandbox \"168790b3633539db1d592b3f10b7cdc036d9fe424ca484fdbd2e34a3a739c3b6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3309279b89ac458728090d82ca2b17a63e232232226029a402765b18fe66b26e\"" Jul 2 07:54:52.452549 env[1235]: time="2024-07-02T07:54:52.450843563Z" level=info msg="StartContainer for \"3309279b89ac458728090d82ca2b17a63e232232226029a402765b18fe66b26e\"" Jul 2 07:54:52.478655 systemd[1]: Started cri-containerd-3309279b89ac458728090d82ca2b17a63e232232226029a402765b18fe66b26e.scope. Jul 2 07:54:52.534601 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 07:54:52.534798 kernel: audit: type=1400 audit(1719906892.507:1011): avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f0c4e0ec988 items=0 ppid=2583 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:52.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303932373962383961633435383732383039306438326361326231 Jul 2 07:54:52.597687 kernel: audit: type=1300 audit(1719906892.507:1011): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f0c4e0ec988 items=0 ppid=2583 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:52.597857 kernel: audit: type=1327 audit(1719906892.507:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303932373962383961633435383732383039306438326361326231 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.639534 kernel: audit: type=1400 audit(1719906892.507:1012): avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.639701 kernel: audit: type=1400 audit(1719906892.507:1012): avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.661911 kernel: audit: type=1400 audit(1719906892.507:1012): avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.663010 env[1235]: time="2024-07-02T07:54:52.662950273Z" level=info msg="StartContainer for \"3309279b89ac458728090d82ca2b17a63e232232226029a402765b18fe66b26e\" returns successfully" Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.684904 kernel: audit: type=1400 audit(1719906892.507:1012): avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.728159 kernel: audit: type=1400 audit(1719906892.507:1012): avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.728322 kernel: audit: type=1400 audit(1719906892.507:1012): avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.728367 kernel: audit: type=1400 audit(1719906892.507:1012): avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.507000 audit: BPF prog-id=142 op=LOAD Jul 2 07:54:52.507000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0000e1ba8 items=0 ppid=2583 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:52.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303932373962383961633435383732383039306438326361326231 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit: BPF prog-id=143 op=LOAD Jul 2 07:54:52.534000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0000e1bf8 items=0 ppid=2583 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:52.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303932373962383961633435383732383039306438326361326231 Jul 2 07:54:52.534000 audit: BPF prog-id=143 op=UNLOAD Jul 2 07:54:52.534000 audit: BPF prog-id=142 op=UNLOAD Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:52.534000 audit: BPF prog-id=144 op=LOAD Jul 2 07:54:52.534000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0000e1c88 items=0 ppid=2583 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:52.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303932373962383961633435383732383039306438326361326231 Jul 2 07:54:52.809177 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:54:52.809358 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:54:53.286607 kubelet[2153]: I0702 07:54:53.286239 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-cpfh9" podStartSLOduration=2.014885891 podCreationTimestamp="2024-07-02 07:54:35 +0000 UTC" firstStartedPulling="2024-07-02 07:54:36.124392416 +0000 UTC m=+19.474428676" lastFinishedPulling="2024-07-02 07:54:52.395685749 +0000 UTC m=+35.745722010" observedRunningTime="2024-07-02 07:54:53.284398561 +0000 UTC m=+36.634434828" watchObservedRunningTime="2024-07-02 07:54:53.286179225 +0000 UTC m=+36.636215493" Jul 2 07:54:54.233000 audit[3164]: AVC avc: denied { write } for pid=3164 comm="tee" name="fd" dev="proc" ino=23375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:54.233000 audit[3164]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd366389c9 a2=241 a3=1b6 items=1 ppid=3124 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.233000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:54:54.233000 audit: PATH item=0 name="/dev/fd/63" inode=23372 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:54.233000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:54.243000 audit[3159]: AVC avc: denied { write } for pid=3159 comm="tee" name="fd" dev="proc" ino=23383 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:54.246000 audit[3157]: AVC avc: denied { write } for pid=3157 comm="tee" name="fd" dev="proc" ino=23384 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:54.243000 audit[3159]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1c6669c8 a2=241 a3=1b6 items=1 ppid=3116 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.246000 audit[3157]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff832b59b9 a2=241 a3=1b6 items=1 ppid=3122 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.246000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:54:54.243000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:54:54.246000 audit: PATH item=0 name="/dev/fd/63" inode=24220 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:54.243000 audit: PATH item=0 name="/dev/fd/63" inode=24224 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:54.246000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:54.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:54.263000 audit[3169]: AVC avc: denied { write } for pid=3169 comm="tee" name="fd" dev="proc" ino=24238 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:54.263000 audit[3169]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd045f59c8 a2=241 a3=1b6 items=1 ppid=3113 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.263000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:54:54.263000 audit: PATH item=0 name="/dev/fd/63" inode=24230 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:54.263000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:54.269000 audit[3166]: AVC avc: denied { write } for pid=3166 comm="tee" name="fd" dev="proc" ino=23420 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:54.287189 systemd[1]: run-containerd-runc-k8s.io-3309279b89ac458728090d82ca2b17a63e232232226029a402765b18fe66b26e-runc.6k4iff.mount: Deactivated successfully. Jul 2 07:54:54.269000 audit[3166]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe21709ca a2=241 a3=1b6 items=1 ppid=3112 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.269000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:54:54.269000 audit: PATH item=0 name="/dev/fd/63" inode=23377 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:54.289000 audit[3178]: AVC avc: denied { write } for pid=3178 comm="tee" name="fd" dev="proc" ino=24246 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:54.289000 audit[3178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd73d99b8 a2=241 a3=1b6 items=1 ppid=3117 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.289000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:54:54.289000 audit: PATH item=0 name="/dev/fd/63" inode=24231 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:54.289000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:54.269000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:54.307000 audit[3192]: AVC avc: denied { write } for pid=3192 comm="tee" name="fd" dev="proc" ino=23434 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:54.307000 audit[3192]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0d6299c8 a2=241 a3=1b6 items=1 ppid=3130 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.307000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:54:54.307000 audit: PATH item=0 name="/dev/fd/63" inode=23423 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:54.307000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:54.831090 systemd-networkd[1034]: vxlan.calico: Link UP Jul 2 07:54:54.831104 systemd-networkd[1034]: vxlan.calico: Gained carrier Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.860000 audit: BPF prog-id=145 op=LOAD Jul 2 07:54:54.860000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcca93d2c0 a2=70 a3=7f7e2fd45000 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.860000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.862000 audit: BPF prog-id=145 op=UNLOAD Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.862000 audit: BPF prog-id=146 op=LOAD Jul 2 07:54:54.862000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcca93d2c0 a2=70 a3=6f items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.862000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.863000 audit: BPF prog-id=146 op=UNLOAD Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcca93d270 a2=70 a3=7ffcca93d2c0 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.863000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.863000 audit: BPF prog-id=147 op=LOAD Jul 2 07:54:54.863000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcca93d250 a2=70 a3=7ffcca93d2c0 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.863000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.864000 audit: BPF prog-id=147 op=UNLOAD Jul 2 07:54:54.864000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.864000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcca93d330 a2=70 a3=0 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.865000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.865000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcca93d320 a2=70 a3=0 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.865000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.865000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcca93d290 a2=70 a3=0 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcca93d360 a2=70 a3=232f8b0 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.867000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcca93d360 a2=70 a3=232c880 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.867000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.867000 audit: BPF prog-id=148 op=LOAD Jul 2 07:54:54.867000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcca93d280 a2=70 a3=0 items=0 ppid=3131 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.867000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:54.875000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.875000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd61bbfdc0 a2=70 a3=fff80800 items=0 ppid=3131 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:54:54.876000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:54.876000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd61bbfc90 a2=70 a3=3 items=0 ppid=3131 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:54:54.893000 audit: BPF prog-id=148 op=UNLOAD Jul 2 07:54:54.893000 audit[1207]: SYSCALL arch=c000003e syscall=47 success=yes exit=2048 a0=e a1=7ffd09d418a0 a2=40000000 a3=0 items=0 ppid=1 pid=1207 auid=4294967295 uid=201 gid=201 euid=201 suid=201 fsuid=201 egid=201 sgid=201 fsgid=201 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.893000 audit: PROCTITLE proctitle=2F7573722F62696E2F646275732D6461656D6F6E002D2D73797374656D002D2D616464726573733D73797374656D643A002D2D6E6F666F726B002D2D6E6F70696466696C65002D2D73797374656D642D61637469766174696F6E002D2D7379736C6F672D6F6E6C79 Jul 2 07:54:54.981000 audit[3304]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3304 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:54.981000 audit[3304]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc6e43d300 a2=0 a3=7ffc6e43d2ec items=0 ppid=3131 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.981000 audit[3302]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:54.981000 audit[3302]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc910b4aa0 a2=0 a3=5646ac80a000 items=0 ppid=3131 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.981000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:54.981000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:54.991000 audit[3303]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3303 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:54.991000 audit[3303]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffceef65670 a2=0 a3=7ffceef6565c items=0 ppid=3131 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.991000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:54.995000 audit[3306]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3306 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:54.995000 audit[3306]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffedae4e690 a2=0 a3=7ffedae4e67c items=0 ppid=3131 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:54.995000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:56.568148 systemd-networkd[1034]: vxlan.calico: Gained IPv6LL Jul 2 07:54:56.973618 env[1235]: time="2024-07-02T07:54:56.973468765Z" level=info msg="StopPodSandbox for \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\"" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.031 [INFO][3328] k8s.go 608: Cleaning up netns ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.031 [INFO][3328] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" iface="eth0" netns="/var/run/netns/cni-ed2fc435-c1bf-b125-1aad-753821d686cd" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.031 [INFO][3328] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" iface="eth0" netns="/var/run/netns/cni-ed2fc435-c1bf-b125-1aad-753821d686cd" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.032 [INFO][3328] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" iface="eth0" netns="/var/run/netns/cni-ed2fc435-c1bf-b125-1aad-753821d686cd" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.032 [INFO][3328] k8s.go 615: Releasing IP address(es) ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.032 [INFO][3328] utils.go 188: Calico CNI releasing IP address ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.064 [INFO][3334] ipam_plugin.go 411: Releasing address using handleID ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.064 [INFO][3334] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.064 [INFO][3334] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.071 [WARNING][3334] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.072 [INFO][3334] ipam_plugin.go 439: Releasing address using workloadID ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.073 [INFO][3334] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:57.076493 env[1235]: 2024-07-02 07:54:57.075 [INFO][3328] k8s.go 621: Teardown processing complete. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:54:57.081581 systemd[1]: run-netns-cni\x2ded2fc435\x2dc1bf\x2db125\x2d1aad\x2d753821d686cd.mount: Deactivated successfully. Jul 2 07:54:57.083126 env[1235]: time="2024-07-02T07:54:57.083067121Z" level=info msg="TearDown network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\" successfully" Jul 2 07:54:57.083275 env[1235]: time="2024-07-02T07:54:57.083125849Z" level=info msg="StopPodSandbox for \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\" returns successfully" Jul 2 07:54:57.084207 env[1235]: time="2024-07-02T07:54:57.084161962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-668d55d57d-qdjvj,Uid:42d413e6-f6b6-45e1-aeb3-5b2079fd6746,Namespace:calico-system,Attempt:1,}" Jul 2 07:54:57.272997 systemd-networkd[1034]: cali82ed425c1c1: Link UP Jul 2 07:54:57.289051 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:54:57.289203 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali82ed425c1c1: link becomes ready Jul 2 07:54:57.290104 systemd-networkd[1034]: cali82ed425c1c1: Gained carrier Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.159 [INFO][3340] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0 calico-kube-controllers-668d55d57d- calico-system 42d413e6-f6b6-45e1-aeb3-5b2079fd6746 706 0 2024-07-02 07:54:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:668d55d57d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal calico-kube-controllers-668d55d57d-qdjvj eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali82ed425c1c1 [] []}} ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Namespace="calico-system" Pod="calico-kube-controllers-668d55d57d-qdjvj" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.160 [INFO][3340] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Namespace="calico-system" Pod="calico-kube-controllers-668d55d57d-qdjvj" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.200 [INFO][3351] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" HandleID="k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.212 [INFO][3351] ipam_plugin.go 264: Auto assigning IP ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" HandleID="k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a360), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", "pod":"calico-kube-controllers-668d55d57d-qdjvj", "timestamp":"2024-07-02 07:54:57.200445137 +0000 UTC"}, Hostname:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.212 [INFO][3351] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.213 [INFO][3351] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.213 [INFO][3351] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal' Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.215 [INFO][3351] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.219 [INFO][3351] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.224 [INFO][3351] ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.226 [INFO][3351] ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.233 [INFO][3351] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.233 [INFO][3351] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.235 [INFO][3351] ipam.go 1685: Creating new handle: k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621 Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.241 [INFO][3351] ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.251 [INFO][3351] ipam.go 1216: Successfully claimed IPs: [192.168.15.193/26] block=192.168.15.192/26 handle="k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.251 [INFO][3351] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.193/26] handle="k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.253 [INFO][3351] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:57.316428 env[1235]: 2024-07-02 07:54:57.253 [INFO][3351] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.15.193/26] IPv6=[] ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" HandleID="k8s-pod-network.d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.317778 env[1235]: 2024-07-02 07:54:57.266 [INFO][3340] k8s.go 386: Populated endpoint ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Namespace="calico-system" Pod="calico-kube-controllers-668d55d57d-qdjvj" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0", GenerateName:"calico-kube-controllers-668d55d57d-", Namespace:"calico-system", SelfLink:"", UID:"42d413e6-f6b6-45e1-aeb3-5b2079fd6746", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"668d55d57d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-668d55d57d-qdjvj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.15.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali82ed425c1c1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:57.317778 env[1235]: 2024-07-02 07:54:57.266 [INFO][3340] k8s.go 387: Calico CNI using IPs: [192.168.15.193/32] ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Namespace="calico-system" Pod="calico-kube-controllers-668d55d57d-qdjvj" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.317778 env[1235]: 2024-07-02 07:54:57.266 [INFO][3340] dataplane_linux.go 68: Setting the host side veth name to cali82ed425c1c1 ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Namespace="calico-system" Pod="calico-kube-controllers-668d55d57d-qdjvj" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.317778 env[1235]: 2024-07-02 07:54:57.291 [INFO][3340] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Namespace="calico-system" Pod="calico-kube-controllers-668d55d57d-qdjvj" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.317778 env[1235]: 2024-07-02 07:54:57.292 [INFO][3340] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Namespace="calico-system" Pod="calico-kube-controllers-668d55d57d-qdjvj" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0", GenerateName:"calico-kube-controllers-668d55d57d-", Namespace:"calico-system", SelfLink:"", UID:"42d413e6-f6b6-45e1-aeb3-5b2079fd6746", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"668d55d57d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621", Pod:"calico-kube-controllers-668d55d57d-qdjvj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.15.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali82ed425c1c1", MAC:"ce:99:1c:84:b7:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:57.317778 env[1235]: 2024-07-02 07:54:57.307 [INFO][3340] k8s.go 500: Wrote updated endpoint to datastore ContainerID="d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621" Namespace="calico-system" Pod="calico-kube-controllers-668d55d57d-qdjvj" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:54:57.336125 env[1235]: time="2024-07-02T07:54:57.335963886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:57.336125 env[1235]: time="2024-07-02T07:54:57.336082938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:57.336439 env[1235]: time="2024-07-02T07:54:57.336102277Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:57.336553 env[1235]: time="2024-07-02T07:54:57.336381712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621 pid=3380 runtime=io.containerd.runc.v2 Jul 2 07:54:57.338000 audit[3381]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:57.338000 audit[3381]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff74e19060 a2=0 a3=7fff74e1904c items=0 ppid=3131 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:57.338000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:57.374087 systemd[1]: Started cri-containerd-d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621.scope. Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit: BPF prog-id=149 op=LOAD Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3380 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:57.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623038643561333663363764653531313639383739313766366131 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3380 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:57.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623038643561333663363764653531313639383739313766366131 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.400000 audit: BPF prog-id=150 op=LOAD Jul 2 07:54:57.400000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ec050 items=0 ppid=3380 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:57.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623038643561333663363764653531313639383739313766366131 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit: BPF prog-id=151 op=LOAD Jul 2 07:54:57.401000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ec098 items=0 ppid=3380 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:57.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623038643561333663363764653531313639383739313766366131 Jul 2 07:54:57.401000 audit: BPF prog-id=151 op=UNLOAD Jul 2 07:54:57.401000 audit: BPF prog-id=150 op=UNLOAD Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:57.401000 audit: BPF prog-id=152 op=LOAD Jul 2 07:54:57.401000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ec4a8 items=0 ppid=3380 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:57.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623038643561333663363764653531313639383739313766366131 Jul 2 07:54:57.439123 env[1235]: time="2024-07-02T07:54:57.439067568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-668d55d57d-qdjvj,Uid:42d413e6-f6b6-45e1-aeb3-5b2079fd6746,Namespace:calico-system,Attempt:1,} returns sandbox id \"d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621\"" Jul 2 07:54:57.442968 env[1235]: time="2024-07-02T07:54:57.442923255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 07:54:58.082209 systemd[1]: run-containerd-runc-k8s.io-d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621-runc.v1GxDf.mount: Deactivated successfully. Jul 2 07:54:58.424663 systemd-networkd[1034]: cali82ed425c1c1: Gained IPv6LL Jul 2 07:54:58.976899 env[1235]: time="2024-07-02T07:54:58.976799969Z" level=info msg="StopPodSandbox for \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\"" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.088 [INFO][3429] k8s.go 608: Cleaning up netns ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.089 [INFO][3429] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" iface="eth0" netns="/var/run/netns/cni-e3718b33-913a-b367-3746-83d3950db567" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.089 [INFO][3429] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" iface="eth0" netns="/var/run/netns/cni-e3718b33-913a-b367-3746-83d3950db567" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.089 [INFO][3429] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" iface="eth0" netns="/var/run/netns/cni-e3718b33-913a-b367-3746-83d3950db567" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.089 [INFO][3429] k8s.go 615: Releasing IP address(es) ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.089 [INFO][3429] utils.go 188: Calico CNI releasing IP address ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.137 [INFO][3435] ipam_plugin.go 411: Releasing address using handleID ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.137 [INFO][3435] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.137 [INFO][3435] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.147 [WARNING][3435] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.147 [INFO][3435] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.149 [INFO][3435] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:59.152280 env[1235]: 2024-07-02 07:54:59.151 [INFO][3429] k8s.go 621: Teardown processing complete. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:54:59.153608 env[1235]: time="2024-07-02T07:54:59.153559747Z" level=info msg="TearDown network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\" successfully" Jul 2 07:54:59.153796 env[1235]: time="2024-07-02T07:54:59.153730564Z" level=info msg="StopPodSandbox for \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\" returns successfully" Jul 2 07:54:59.155066 env[1235]: time="2024-07-02T07:54:59.154991902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-vknkw,Uid:af28b2ce-db18-4892-abe4-8757652fa27c,Namespace:kube-system,Attempt:1,}" Jul 2 07:54:59.161618 systemd[1]: run-netns-cni\x2de3718b33\x2d913a\x2db367\x2d3746\x2d83d3950db567.mount: Deactivated successfully. Jul 2 07:54:59.375973 systemd-networkd[1034]: cali97264612a39: Link UP Jul 2 07:54:59.394210 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:54:59.394320 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali97264612a39: link becomes ready Jul 2 07:54:59.395518 systemd-networkd[1034]: cali97264612a39: Gained carrier Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.254 [INFO][3441] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0 coredns-5dd5756b68- kube-system af28b2ce-db18-4892-abe4-8757652fa27c 716 0 2024-07-02 07:54:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal coredns-5dd5756b68-vknkw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali97264612a39 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Namespace="kube-system" Pod="coredns-5dd5756b68-vknkw" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.255 [INFO][3441] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Namespace="kube-system" Pod="coredns-5dd5756b68-vknkw" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.322 [INFO][3453] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" HandleID="k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.336 [INFO][3453] ipam_plugin.go 264: Auto assigning IP ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" HandleID="k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309410), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", "pod":"coredns-5dd5756b68-vknkw", "timestamp":"2024-07-02 07:54:59.322834386 +0000 UTC"}, Hostname:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.336 [INFO][3453] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.336 [INFO][3453] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.336 [INFO][3453] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal' Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.338 [INFO][3453] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.343 [INFO][3453] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.348 [INFO][3453] ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.351 [INFO][3453] ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.354 [INFO][3453] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.354 [INFO][3453] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.356 [INFO][3453] ipam.go 1685: Creating new handle: k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07 Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.360 [INFO][3453] ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.366 [INFO][3453] ipam.go 1216: Successfully claimed IPs: [192.168.15.194/26] block=192.168.15.192/26 handle="k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.367 [INFO][3453] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.194/26] handle="k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.367 [INFO][3453] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:59.414107 env[1235]: 2024-07-02 07:54:59.367 [INFO][3453] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.15.194/26] IPv6=[] ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" HandleID="k8s-pod-network.1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.415403 env[1235]: 2024-07-02 07:54:59.368 [INFO][3441] k8s.go 386: Populated endpoint ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Namespace="kube-system" Pod="coredns-5dd5756b68-vknkw" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"af28b2ce-db18-4892-abe4-8757652fa27c", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5dd5756b68-vknkw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali97264612a39", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:59.415403 env[1235]: 2024-07-02 07:54:59.369 [INFO][3441] k8s.go 387: Calico CNI using IPs: [192.168.15.194/32] ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Namespace="kube-system" Pod="coredns-5dd5756b68-vknkw" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.415403 env[1235]: 2024-07-02 07:54:59.369 [INFO][3441] dataplane_linux.go 68: Setting the host side veth name to cali97264612a39 ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Namespace="kube-system" Pod="coredns-5dd5756b68-vknkw" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.415403 env[1235]: 2024-07-02 07:54:59.396 [INFO][3441] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Namespace="kube-system" Pod="coredns-5dd5756b68-vknkw" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.415403 env[1235]: 2024-07-02 07:54:59.397 [INFO][3441] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Namespace="kube-system" Pod="coredns-5dd5756b68-vknkw" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"af28b2ce-db18-4892-abe4-8757652fa27c", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07", Pod:"coredns-5dd5756b68-vknkw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali97264612a39", MAC:"ea:17:8b:2e:b4:a1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:59.415403 env[1235]: 2024-07-02 07:54:59.411 [INFO][3441] k8s.go 500: Wrote updated endpoint to datastore ContainerID="1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07" Namespace="kube-system" Pod="coredns-5dd5756b68-vknkw" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:54:59.475000 audit[3472]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:59.482267 kernel: kauditd_printk_skb: 219 callbacks suppressed Jul 2 07:54:59.482413 kernel: audit: type=1325 audit(1719906899.475:1063): table=filter:102 family=2 entries=38 op=nft_register_chain pid=3472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:59.503691 env[1235]: time="2024-07-02T07:54:59.503608709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:59.503978 env[1235]: time="2024-07-02T07:54:59.503920699Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:59.504110 env[1235]: time="2024-07-02T07:54:59.503980631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:59.504322 env[1235]: time="2024-07-02T07:54:59.504217904Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07 pid=3479 runtime=io.containerd.runc.v2 Jul 2 07:54:59.475000 audit[3472]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd9ccd0ff0 a2=0 a3=7ffd9ccd0fdc items=0 ppid=3131 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.552003 kernel: audit: type=1300 audit(1719906899.475:1063): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd9ccd0ff0 a2=0 a3=7ffd9ccd0fdc items=0 ppid=3131 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.475000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:59.572034 kernel: audit: type=1327 audit(1719906899.475:1063): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:59.588691 systemd[1]: Started cri-containerd-1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07.scope. Jul 2 07:54:59.593198 systemd[1]: run-containerd-runc-k8s.io-1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07-runc.0haKIB.mount: Deactivated successfully. Jul 2 07:54:59.640974 kernel: audit: type=1400 audit(1719906899.618:1064): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.664975 kernel: audit: type=1400 audit(1719906899.618:1065): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.702236 env[1235]: time="2024-07-02T07:54:59.693635445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-vknkw,Uid:af28b2ce-db18-4892-abe4-8757652fa27c,Namespace:kube-system,Attempt:1,} returns sandbox id \"1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07\"" Jul 2 07:54:59.702236 env[1235]: time="2024-07-02T07:54:59.697224405Z" level=info msg="CreateContainer within sandbox \"1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:54:59.706913 kernel: audit: type=1400 audit(1719906899.618:1066): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.707023 kernel: audit: type=1400 audit(1719906899.618:1067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.733356 env[1235]: time="2024-07-02T07:54:59.733283638Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:59.740233 env[1235]: time="2024-07-02T07:54:59.740173801Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:59.748169 env[1235]: time="2024-07-02T07:54:59.748105600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.752625 env[1235]: time="2024-07-02T07:54:59.752484346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:59.754005 env[1235]: time="2024-07-02T07:54:59.753964120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 07:54:59.770145 kernel: audit: type=1400 audit(1719906899.618:1068): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.770358 kernel: audit: type=1400 audit(1719906899.618:1069): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.778471 env[1235]: time="2024-07-02T07:54:59.778420388Z" level=info msg="CreateContainer within sandbox \"d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 07:54:59.783416 env[1235]: time="2024-07-02T07:54:59.783366320Z" level=info msg="CreateContainer within sandbox \"1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fa70b73d81d04c01f5e89a530542075f5340b2dfbdbcb825944ef345b077884e\"" Jul 2 07:54:59.787593 env[1235]: time="2024-07-02T07:54:59.787525933Z" level=info msg="StartContainer for \"fa70b73d81d04c01f5e89a530542075f5340b2dfbdbcb825944ef345b077884e\"" Jul 2 07:54:59.797084 kernel: audit: type=1400 audit(1719906899.618:1070): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit: BPF prog-id=153 op=LOAD Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3479 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373364383262643036303365316632346363336135386162623463 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3479 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373364383262643036303365316632346363336135386162623463 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.619000 audit: BPF prog-id=154 op=LOAD Jul 2 07:54:59.619000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2170 items=0 ppid=3479 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373364383262643036303365316632346363336135386162623463 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit: BPF prog-id=155 op=LOAD Jul 2 07:54:59.640000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000288a38 items=0 ppid=3479 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373364383262643036303365316632346363336135386162623463 Jul 2 07:54:59.640000 audit: BPF prog-id=155 op=UNLOAD Jul 2 07:54:59.640000 audit: BPF prog-id=154 op=UNLOAD Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.640000 audit: BPF prog-id=156 op=LOAD Jul 2 07:54:59.640000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000288e48 items=0 ppid=3479 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373364383262643036303365316632346363336135386162623463 Jul 2 07:54:59.813523 env[1235]: time="2024-07-02T07:54:59.813441176Z" level=info msg="CreateContainer within sandbox \"d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76\"" Jul 2 07:54:59.819379 env[1235]: time="2024-07-02T07:54:59.819309500Z" level=info msg="StartContainer for \"b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76\"" Jul 2 07:54:59.827517 systemd[1]: Started cri-containerd-fa70b73d81d04c01f5e89a530542075f5340b2dfbdbcb825944ef345b077884e.scope. Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.851000 audit: BPF prog-id=157 op=LOAD Jul 2 07:54:59.853000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.853000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3479 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373062373364383164303463303166356538396135333035343230 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3479 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373062373364383164303463303166356538396135333035343230 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.854000 audit: BPF prog-id=158 op=LOAD Jul 2 07:54:59.854000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003c4920 items=0 ppid=3479 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373062373364383164303463303166356538396135333035343230 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.856000 audit: BPF prog-id=159 op=LOAD Jul 2 07:54:59.856000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003c4968 items=0 ppid=3479 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373062373364383164303463303166356538396135333035343230 Jul 2 07:54:59.857000 audit: BPF prog-id=159 op=UNLOAD Jul 2 07:54:59.857000 audit: BPF prog-id=158 op=UNLOAD Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.857000 audit: BPF prog-id=160 op=LOAD Jul 2 07:54:59.857000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c4d78 items=0 ppid=3479 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373062373364383164303463303166356538396135333035343230 Jul 2 07:54:59.873674 systemd[1]: Started cri-containerd-b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76.scope. Jul 2 07:54:59.896108 env[1235]: time="2024-07-02T07:54:59.895968542Z" level=info msg="StartContainer for \"fa70b73d81d04c01f5e89a530542075f5340b2dfbdbcb825944ef345b077884e\" returns successfully" Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.919000 audit: BPF prog-id=161 op=LOAD Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3380 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303430343530313739366233373135613237356431356663323666 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3380 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303430343530313739366233373135613237356431356663323666 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit: BPF prog-id=162 op=LOAD Jul 2 07:54:59.920000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e9fa0 items=0 ppid=3380 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303430343530313739366233373135613237356431356663323666 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit: BPF prog-id=163 op=LOAD Jul 2 07:54:59.920000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e9fe8 items=0 ppid=3380 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303430343530313739366233373135613237356431356663323666 Jul 2 07:54:59.920000 audit: BPF prog-id=163 op=UNLOAD Jul 2 07:54:59.920000 audit: BPF prog-id=162 op=UNLOAD Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { perfmon } for pid=3551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit[3551]: AVC avc: denied { bpf } for pid=3551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:59.920000 audit: BPF prog-id=164 op=LOAD Jul 2 07:54:59.920000 audit[3551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b83f8 items=0 ppid=3380 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:59.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303430343530313739366233373135613237356431356663323666 Jul 2 07:54:59.976204 env[1235]: time="2024-07-02T07:54:59.976154333Z" level=info msg="StopPodSandbox for \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\"" Jul 2 07:54:59.978670 env[1235]: time="2024-07-02T07:54:59.978619774Z" level=info msg="StartContainer for \"b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76\" returns successfully" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.067 [INFO][3608] k8s.go 608: Cleaning up netns ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.067 [INFO][3608] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" iface="eth0" netns="/var/run/netns/cni-2d0a2bc0-a75c-73f8-f5de-53a8c6b5e039" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.067 [INFO][3608] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" iface="eth0" netns="/var/run/netns/cni-2d0a2bc0-a75c-73f8-f5de-53a8c6b5e039" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.068 [INFO][3608] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" iface="eth0" netns="/var/run/netns/cni-2d0a2bc0-a75c-73f8-f5de-53a8c6b5e039" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.068 [INFO][3608] k8s.go 615: Releasing IP address(es) ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.068 [INFO][3608] utils.go 188: Calico CNI releasing IP address ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.125 [INFO][3618] ipam_plugin.go 411: Releasing address using handleID ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.126 [INFO][3618] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.126 [INFO][3618] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.135 [WARNING][3618] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.135 [INFO][3618] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.145 [INFO][3618] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:00.151062 env[1235]: 2024-07-02 07:55:00.147 [INFO][3608] k8s.go 621: Teardown processing complete. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:00.152359 env[1235]: time="2024-07-02T07:55:00.152295922Z" level=info msg="TearDown network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\" successfully" Jul 2 07:55:00.152567 env[1235]: time="2024-07-02T07:55:00.152529090Z" level=info msg="StopPodSandbox for \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\" returns successfully" Jul 2 07:55:00.159168 env[1235]: time="2024-07-02T07:55:00.159125070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-928qd,Uid:1e68b892-4c7b-4e50-9b51-2c98308fc107,Namespace:calico-system,Attempt:1,}" Jul 2 07:55:00.172655 systemd[1]: run-netns-cni\x2d2d0a2bc0\x2da75c\x2d73f8\x2df5de\x2d53a8c6b5e039.mount: Deactivated successfully. Jul 2 07:55:00.310740 kubelet[2153]: I0702 07:55:00.310687 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-vknkw" podStartSLOduration=31.310627061 podCreationTimestamp="2024-07-02 07:54:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:00.267169858 +0000 UTC m=+43.617206125" watchObservedRunningTime="2024-07-02 07:55:00.310627061 +0000 UTC m=+43.660663394" Jul 2 07:55:00.342821 kubelet[2153]: I0702 07:55:00.342780 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-668d55d57d-qdjvj" podStartSLOduration=23.025578584 podCreationTimestamp="2024-07-02 07:54:35 +0000 UTC" firstStartedPulling="2024-07-02 07:54:57.440958444 +0000 UTC m=+40.790994701" lastFinishedPulling="2024-07-02 07:54:59.758083224 +0000 UTC m=+43.108119487" observedRunningTime="2024-07-02 07:55:00.313454268 +0000 UTC m=+43.663490529" watchObservedRunningTime="2024-07-02 07:55:00.34270337 +0000 UTC m=+43.692739638" Jul 2 07:55:00.416000 audit[3664]: NETFILTER_CFG table=filter:103 family=2 entries=11 op=nft_register_rule pid=3664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:00.416000 audit[3664]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff87b74ea0 a2=0 a3=7fff87b74e8c items=0 ppid=2324 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:00.422000 audit[3664]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:00.422000 audit[3664]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff87b74ea0 a2=0 a3=7fff87b74e8c items=0 ppid=2324 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:00.472650 systemd-networkd[1034]: cali97264612a39: Gained IPv6LL Jul 2 07:55:00.475701 systemd-networkd[1034]: caliea7075fd151: Link UP Jul 2 07:55:00.484913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:55:00.492907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea7075fd151: link becomes ready Jul 2 07:55:00.501937 systemd-networkd[1034]: caliea7075fd151: Gained carrier Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.313 [INFO][3628] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0 csi-node-driver- calico-system 1e68b892-4c7b-4e50-9b51-2c98308fc107 728 0 2024-07-02 07:54:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal csi-node-driver-928qd eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliea7075fd151 [] []}} ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Namespace="calico-system" Pod="csi-node-driver-928qd" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.313 [INFO][3628] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Namespace="calico-system" Pod="csi-node-driver-928qd" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.386 [INFO][3655] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" HandleID="k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.408 [INFO][3655] ipam_plugin.go 264: Auto assigning IP ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" HandleID="k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003122c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", "pod":"csi-node-driver-928qd", "timestamp":"2024-07-02 07:55:00.386089607 +0000 UTC"}, Hostname:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.408 [INFO][3655] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.408 [INFO][3655] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.408 [INFO][3655] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal' Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.412 [INFO][3655] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.421 [INFO][3655] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.430 [INFO][3655] ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.434 [INFO][3655] ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.437 [INFO][3655] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.438 [INFO][3655] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.440 [INFO][3655] ipam.go 1685: Creating new handle: k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7 Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.451 [INFO][3655] ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.461 [INFO][3655] ipam.go 1216: Successfully claimed IPs: [192.168.15.195/26] block=192.168.15.192/26 handle="k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.461 [INFO][3655] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.195/26] handle="k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.461 [INFO][3655] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:00.522115 env[1235]: 2024-07-02 07:55:00.461 [INFO][3655] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.15.195/26] IPv6=[] ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" HandleID="k8s-pod-network.9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.523383 env[1235]: 2024-07-02 07:55:00.463 [INFO][3628] k8s.go 386: Populated endpoint ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Namespace="calico-system" Pod="csi-node-driver-928qd" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e68b892-4c7b-4e50-9b51-2c98308fc107", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-928qd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.15.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliea7075fd151", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:00.523383 env[1235]: 2024-07-02 07:55:00.463 [INFO][3628] k8s.go 387: Calico CNI using IPs: [192.168.15.195/32] ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Namespace="calico-system" Pod="csi-node-driver-928qd" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.523383 env[1235]: 2024-07-02 07:55:00.464 [INFO][3628] dataplane_linux.go 68: Setting the host side veth name to caliea7075fd151 ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Namespace="calico-system" Pod="csi-node-driver-928qd" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.523383 env[1235]: 2024-07-02 07:55:00.502 [INFO][3628] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Namespace="calico-system" Pod="csi-node-driver-928qd" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.523383 env[1235]: 2024-07-02 07:55:00.502 [INFO][3628] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Namespace="calico-system" Pod="csi-node-driver-928qd" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e68b892-4c7b-4e50-9b51-2c98308fc107", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7", Pod:"csi-node-driver-928qd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.15.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliea7075fd151", MAC:"26:42:ec:89:a2:17", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:00.523383 env[1235]: 2024-07-02 07:55:00.518 [INFO][3628] k8s.go 500: Wrote updated endpoint to datastore ContainerID="9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7" Namespace="calico-system" Pod="csi-node-driver-928qd" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:00.528000 audit[3668]: NETFILTER_CFG table=filter:105 family=2 entries=8 op=nft_register_rule pid=3668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:00.528000 audit[3668]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf1897f90 a2=0 a3=7ffdf1897f7c items=0 ppid=2324 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:00.548970 env[1235]: time="2024-07-02T07:55:00.548853244Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:00.549161 env[1235]: time="2024-07-02T07:55:00.548996056Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:00.549161 env[1235]: time="2024-07-02T07:55:00.549039902Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:00.549555 env[1235]: time="2024-07-02T07:55:00.549483456Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7 pid=3688 runtime=io.containerd.runc.v2 Jul 2 07:55:00.564000 audit[3668]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:00.576476 systemd[1]: Started cri-containerd-9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7.scope. Jul 2 07:55:00.564000 audit[3668]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf1897f90 a2=0 a3=7ffdf1897f7c items=0 ppid=2324 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:00.612000 audit[3711]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:00.612000 audit[3711]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffe464f6ba0 a2=0 a3=7ffe464f6b8c items=0 ppid=3131 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.612000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.638000 audit: BPF prog-id=165 op=LOAD Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3688 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656262666537323034663435386236633436633037636231386232 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3688 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656262666537323034663435386236633436633037636231386232 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit: BPF prog-id=166 op=LOAD Jul 2 07:55:00.639000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00035ca50 items=0 ppid=3688 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656262666537323034663435386236633436633037636231386232 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit: BPF prog-id=167 op=LOAD Jul 2 07:55:00.639000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00035ca98 items=0 ppid=3688 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656262666537323034663435386236633436633037636231386232 Jul 2 07:55:00.639000 audit: BPF prog-id=167 op=UNLOAD Jul 2 07:55:00.639000 audit: BPF prog-id=166 op=UNLOAD Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:00.639000 audit: BPF prog-id=168 op=LOAD Jul 2 07:55:00.639000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00035cea8 items=0 ppid=3688 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:00.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656262666537323034663435386236633436633037636231386232 Jul 2 07:55:00.660452 env[1235]: time="2024-07-02T07:55:00.660392520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-928qd,Uid:1e68b892-4c7b-4e50-9b51-2c98308fc107,Namespace:calico-system,Attempt:1,} returns sandbox id \"9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7\"" Jul 2 07:55:00.663475 env[1235]: time="2024-07-02T07:55:00.663430616Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:55:00.975429 env[1235]: time="2024-07-02T07:55:00.975380939Z" level=info msg="StopPodSandbox for \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\"" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.057 [INFO][3737] k8s.go 608: Cleaning up netns ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.058 [INFO][3737] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" iface="eth0" netns="/var/run/netns/cni-16d1f07f-5cdb-18f5-f064-aa4f4c616b45" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.058 [INFO][3737] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" iface="eth0" netns="/var/run/netns/cni-16d1f07f-5cdb-18f5-f064-aa4f4c616b45" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.058 [INFO][3737] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" iface="eth0" netns="/var/run/netns/cni-16d1f07f-5cdb-18f5-f064-aa4f4c616b45" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.058 [INFO][3737] k8s.go 615: Releasing IP address(es) ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.058 [INFO][3737] utils.go 188: Calico CNI releasing IP address ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.091 [INFO][3743] ipam_plugin.go 411: Releasing address using handleID ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.091 [INFO][3743] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.091 [INFO][3743] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.100 [WARNING][3743] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.100 [INFO][3743] ipam_plugin.go 439: Releasing address using workloadID ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.102 [INFO][3743] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:01.104919 env[1235]: 2024-07-02 07:55:01.103 [INFO][3737] k8s.go 621: Teardown processing complete. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:01.106064 env[1235]: time="2024-07-02T07:55:01.106005703Z" level=info msg="TearDown network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\" successfully" Jul 2 07:55:01.106216 env[1235]: time="2024-07-02T07:55:01.106194943Z" level=info msg="StopPodSandbox for \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\" returns successfully" Jul 2 07:55:01.107358 env[1235]: time="2024-07-02T07:55:01.107315018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fljks,Uid:9e97620e-d188-4284-b33f-e2b87abc8e79,Namespace:kube-system,Attempt:1,}" Jul 2 07:55:01.166024 systemd[1]: run-containerd-runc-k8s.io-b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76-runc.j9knvC.mount: Deactivated successfully. Jul 2 07:55:01.166226 systemd[1]: run-netns-cni\x2d16d1f07f\x2d5cdb\x2d18f5\x2df064\x2daa4f4c616b45.mount: Deactivated successfully. Jul 2 07:55:01.273978 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia520123a5ee: link becomes ready Jul 2 07:55:01.266108 systemd-networkd[1034]: calia520123a5ee: Link UP Jul 2 07:55:01.275141 systemd-networkd[1034]: calia520123a5ee: Gained carrier Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.172 [INFO][3751] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0 coredns-5dd5756b68- kube-system 9e97620e-d188-4284-b33f-e2b87abc8e79 753 0 2024-07-02 07:54:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal coredns-5dd5756b68-fljks eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia520123a5ee [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Namespace="kube-system" Pod="coredns-5dd5756b68-fljks" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.173 [INFO][3751] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Namespace="kube-system" Pod="coredns-5dd5756b68-fljks" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.213 [INFO][3763] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" HandleID="k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.224 [INFO][3763] ipam_plugin.go 264: Auto assigning IP ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" HandleID="k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a930), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", "pod":"coredns-5dd5756b68-fljks", "timestamp":"2024-07-02 07:55:01.213717697 +0000 UTC"}, Hostname:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.224 [INFO][3763] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.224 [INFO][3763] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.224 [INFO][3763] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal' Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.227 [INFO][3763] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.232 [INFO][3763] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.238 [INFO][3763] ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.240 [INFO][3763] ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.242 [INFO][3763] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.242 [INFO][3763] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.244 [INFO][3763] ipam.go 1685: Creating new handle: k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.247 [INFO][3763] ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.256 [INFO][3763] ipam.go 1216: Successfully claimed IPs: [192.168.15.196/26] block=192.168.15.192/26 handle="k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.256 [INFO][3763] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.196/26] handle="k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.256 [INFO][3763] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:01.299682 env[1235]: 2024-07-02 07:55:01.256 [INFO][3763] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.15.196/26] IPv6=[] ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" HandleID="k8s-pod-network.05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.300948 env[1235]: 2024-07-02 07:55:01.260 [INFO][3751] k8s.go 386: Populated endpoint ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Namespace="kube-system" Pod="coredns-5dd5756b68-fljks" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9e97620e-d188-4284-b33f-e2b87abc8e79", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5dd5756b68-fljks", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia520123a5ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:01.300948 env[1235]: 2024-07-02 07:55:01.260 [INFO][3751] k8s.go 387: Calico CNI using IPs: [192.168.15.196/32] ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Namespace="kube-system" Pod="coredns-5dd5756b68-fljks" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.300948 env[1235]: 2024-07-02 07:55:01.260 [INFO][3751] dataplane_linux.go 68: Setting the host side veth name to calia520123a5ee ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Namespace="kube-system" Pod="coredns-5dd5756b68-fljks" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.300948 env[1235]: 2024-07-02 07:55:01.276 [INFO][3751] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Namespace="kube-system" Pod="coredns-5dd5756b68-fljks" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.300948 env[1235]: 2024-07-02 07:55:01.279 [INFO][3751] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Namespace="kube-system" Pod="coredns-5dd5756b68-fljks" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9e97620e-d188-4284-b33f-e2b87abc8e79", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b", Pod:"coredns-5dd5756b68-fljks", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia520123a5ee", MAC:"2e:67:c3:66:96:f5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:01.300948 env[1235]: 2024-07-02 07:55:01.293 [INFO][3751] k8s.go 500: Wrote updated endpoint to datastore ContainerID="05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b" Namespace="kube-system" Pod="coredns-5dd5756b68-fljks" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:01.332094 env[1235]: time="2024-07-02T07:55:01.331966198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:01.332094 env[1235]: time="2024-07-02T07:55:01.332028291Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:01.332094 env[1235]: time="2024-07-02T07:55:01.332057006Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:01.332929 env[1235]: time="2024-07-02T07:55:01.332838230Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b pid=3787 runtime=io.containerd.runc.v2 Jul 2 07:55:01.370357 systemd[1]: run-containerd-runc-k8s.io-05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b-runc.sXxeLe.mount: Deactivated successfully. Jul 2 07:55:01.379460 systemd[1]: Started cri-containerd-05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b.scope. Jul 2 07:55:01.389000 audit[3795]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3795 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:01.389000 audit[3795]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffd38dcd900 a2=0 a3=7ffd38dcd8ec items=0 ppid=3131 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.389000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.400000 audit: BPF prog-id=169 op=LOAD Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3787 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383737363636666136336131313463353531666361376330386633 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3787 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383737363636666136336131313463353531666361376330386633 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit: BPF prog-id=170 op=LOAD Jul 2 07:55:01.402000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219240 items=0 ppid=3787 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383737363636666136336131313463353531666361376330386633 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit: BPF prog-id=171 op=LOAD Jul 2 07:55:01.402000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219288 items=0 ppid=3787 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383737363636666136336131313463353531666361376330386633 Jul 2 07:55:01.402000 audit: BPF prog-id=171 op=UNLOAD Jul 2 07:55:01.402000 audit: BPF prog-id=170 op=UNLOAD Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.402000 audit: BPF prog-id=172 op=LOAD Jul 2 07:55:01.402000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219698 items=0 ppid=3787 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383737363636666136336131313463353531666361376330386633 Jul 2 07:55:01.445764 env[1235]: time="2024-07-02T07:55:01.445689056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fljks,Uid:9e97620e-d188-4284-b33f-e2b87abc8e79,Namespace:kube-system,Attempt:1,} returns sandbox id \"05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b\"" Jul 2 07:55:01.450112 env[1235]: time="2024-07-02T07:55:01.449665863Z" level=info msg="CreateContainer within sandbox \"05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:55:01.466500 env[1235]: time="2024-07-02T07:55:01.466434915Z" level=info msg="CreateContainer within sandbox \"05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ccb65a1c88f97f6c2832a33a78ca0698e367817000d01f4e277f416dd921f968\"" Jul 2 07:55:01.468332 env[1235]: time="2024-07-02T07:55:01.468288727Z" level=info msg="StartContainer for \"ccb65a1c88f97f6c2832a33a78ca0698e367817000d01f4e277f416dd921f968\"" Jul 2 07:55:01.493931 systemd[1]: Started cri-containerd-ccb65a1c88f97f6c2832a33a78ca0698e367817000d01f4e277f416dd921f968.scope. Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.522000 audit: BPF prog-id=173 op=LOAD Jul 2 07:55:01.522000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.522000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3787 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623635613163383866393766366332383332613333613738636130 Jul 2 07:55:01.522000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.522000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3787 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623635613163383866393766366332383332613333613738636130 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit: BPF prog-id=174 op=LOAD Jul 2 07:55:01.523000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000288570 items=0 ppid=3787 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623635613163383866393766366332383332613333613738636130 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit: BPF prog-id=175 op=LOAD Jul 2 07:55:01.523000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002885b8 items=0 ppid=3787 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623635613163383866393766366332383332613333613738636130 Jul 2 07:55:01.523000 audit: BPF prog-id=175 op=UNLOAD Jul 2 07:55:01.523000 audit: BPF prog-id=174 op=UNLOAD Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.523000 audit: BPF prog-id=176 op=LOAD Jul 2 07:55:01.523000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002889c8 items=0 ppid=3787 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623635613163383866393766366332383332613333613738636130 Jul 2 07:55:01.556145 env[1235]: time="2024-07-02T07:55:01.556087619Z" level=info msg="StartContainer for \"ccb65a1c88f97f6c2832a33a78ca0698e367817000d01f4e277f416dd921f968\" returns successfully" Jul 2 07:55:01.815765 env[1235]: time="2024-07-02T07:55:01.815700921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:01.818096 env[1235]: time="2024-07-02T07:55:01.818039303Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:01.820495 env[1235]: time="2024-07-02T07:55:01.820451872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:01.822717 env[1235]: time="2024-07-02T07:55:01.822677130Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:01.827633 env[1235]: time="2024-07-02T07:55:01.827360522Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:55:01.836099 env[1235]: time="2024-07-02T07:55:01.836045822Z" level=info msg="CreateContainer within sandbox \"9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:55:01.859033 env[1235]: time="2024-07-02T07:55:01.858971326Z" level=info msg="CreateContainer within sandbox \"9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ebc7b3cc475ac128f4c5fc27fd871ca11818025daa69b59267c16265e40af70a\"" Jul 2 07:55:01.861559 env[1235]: time="2024-07-02T07:55:01.859977751Z" level=info msg="StartContainer for \"ebc7b3cc475ac128f4c5fc27fd871ca11818025daa69b59267c16265e40af70a\"" Jul 2 07:55:01.886783 systemd[1]: Started cri-containerd-ebc7b3cc475ac128f4c5fc27fd871ca11818025daa69b59267c16265e40af70a.scope. Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efdd45e7d58 items=0 ppid=3688 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562633762336363343735616331323866346335666332376664383731 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.917000 audit: BPF prog-id=177 op=LOAD Jul 2 07:55:01.917000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000282898 items=0 ppid=3688 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562633762336363343735616331323866346335666332376664383731 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit: BPF prog-id=178 op=LOAD Jul 2 07:55:01.918000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002828e8 items=0 ppid=3688 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562633762336363343735616331323866346335666332376664383731 Jul 2 07:55:01.918000 audit: BPF prog-id=178 op=UNLOAD Jul 2 07:55:01.918000 audit: BPF prog-id=177 op=UNLOAD Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:01.918000 audit: BPF prog-id=179 op=LOAD Jul 2 07:55:01.918000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000282978 items=0 ppid=3688 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:01.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562633762336363343735616331323866346335666332376664383731 Jul 2 07:55:01.944260 env[1235]: time="2024-07-02T07:55:01.944110977Z" level=info msg="StartContainer for \"ebc7b3cc475ac128f4c5fc27fd871ca11818025daa69b59267c16265e40af70a\" returns successfully" Jul 2 07:55:01.949962 env[1235]: time="2024-07-02T07:55:01.949893881Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:55:02.200688 systemd-networkd[1034]: caliea7075fd151: Gained IPv6LL Jul 2 07:55:02.275633 kubelet[2153]: I0702 07:55:02.275592 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-fljks" podStartSLOduration=33.275542721 podCreationTimestamp="2024-07-02 07:54:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:55:02.274784804 +0000 UTC m=+45.624821073" watchObservedRunningTime="2024-07-02 07:55:02.275542721 +0000 UTC m=+45.625578989" Jul 2 07:55:02.320000 audit[3895]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3895 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:02.320000 audit[3895]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff2ef18de0 a2=0 a3=7fff2ef18dcc items=0 ppid=2324 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:02.322000 audit[3895]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3895 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:02.322000 audit[3895]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff2ef18de0 a2=0 a3=7fff2ef18dcc items=0 ppid=2324 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.322000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:03.023320 env[1235]: time="2024-07-02T07:55:03.023250550Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:03.026164 env[1235]: time="2024-07-02T07:55:03.026108433Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:03.028389 env[1235]: time="2024-07-02T07:55:03.028340088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:03.030541 env[1235]: time="2024-07-02T07:55:03.030493046Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:03.031214 env[1235]: time="2024-07-02T07:55:03.031172822Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:55:03.035651 env[1235]: time="2024-07-02T07:55:03.035513467Z" level=info msg="CreateContainer within sandbox \"9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:55:03.061199 env[1235]: time="2024-07-02T07:55:03.061136546Z" level=info msg="CreateContainer within sandbox \"9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d76c423112d37df89c9a3ee0c5fc9c6c3bc0f8129486bf864085f8302160a210\"" Jul 2 07:55:03.063483 env[1235]: time="2024-07-02T07:55:03.063046001Z" level=info msg="StartContainer for \"d76c423112d37df89c9a3ee0c5fc9c6c3bc0f8129486bf864085f8302160a210\"" Jul 2 07:55:03.097861 systemd-networkd[1034]: calia520123a5ee: Gained IPv6LL Jul 2 07:55:03.109058 systemd[1]: Started cri-containerd-d76c423112d37df89c9a3ee0c5fc9c6c3bc0f8129486bf864085f8302160a210.scope. Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb4e6a1f898 items=0 ppid=3688 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366334323331313264333764663839633961336565306335666339 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit: BPF prog-id=180 op=LOAD Jul 2 07:55:03.131000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002f5178 items=0 ppid=3688 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366334323331313264333764663839633961336565306335666339 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit: BPF prog-id=181 op=LOAD Jul 2 07:55:03.131000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002f51c8 items=0 ppid=3688 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366334323331313264333764663839633961336565306335666339 Jul 2 07:55:03.131000 audit: BPF prog-id=181 op=UNLOAD Jul 2 07:55:03.131000 audit: BPF prog-id=180 op=UNLOAD Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:03.131000 audit: BPF prog-id=182 op=LOAD Jul 2 07:55:03.131000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002f5258 items=0 ppid=3688 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366334323331313264333764663839633961336565306335666339 Jul 2 07:55:03.154349 env[1235]: time="2024-07-02T07:55:03.154288563Z" level=info msg="StartContainer for \"d76c423112d37df89c9a3ee0c5fc9c6c3bc0f8129486bf864085f8302160a210\" returns successfully" Jul 2 07:55:03.283184 kubelet[2153]: I0702 07:55:03.283147 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-928qd" podStartSLOduration=25.914467204 podCreationTimestamp="2024-07-02 07:54:35 +0000 UTC" firstStartedPulling="2024-07-02 07:55:00.662975085 +0000 UTC m=+44.013011331" lastFinishedPulling="2024-07-02 07:55:03.031598227 +0000 UTC m=+46.381634486" observedRunningTime="2024-07-02 07:55:03.280578348 +0000 UTC m=+46.630614617" watchObservedRunningTime="2024-07-02 07:55:03.283090359 +0000 UTC m=+46.633126626" Jul 2 07:55:03.331000 audit[3934]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:03.331000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffe8058370 a2=0 a3=7fffe805835c items=0 ppid=2324 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:03.339000 audit[3934]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:03.339000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffe8058370 a2=0 a3=7fffe805835c items=0 ppid=2324 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:03.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:04.135864 kubelet[2153]: I0702 07:55:04.135820 2153 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:55:04.135864 kubelet[2153]: I0702 07:55:04.135856 2153 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:55:10.323329 kubelet[2153]: I0702 07:55:10.323267 2153 topology_manager.go:215] "Topology Admit Handler" podUID="a65d2567-2f75-431c-80a3-f422f35eb692" podNamespace="calico-apiserver" podName="calico-apiserver-6b587f7858-pqcfv" Jul 2 07:55:10.333549 systemd[1]: Created slice kubepods-besteffort-poda65d2567_2f75_431c_80a3_f422f35eb692.slice. Jul 2 07:55:10.367736 kubelet[2153]: I0702 07:55:10.367677 2153 topology_manager.go:215] "Topology Admit Handler" podUID="b069419b-dc7a-4e7d-9cda-fc703135fa9d" podNamespace="calico-apiserver" podName="calico-apiserver-6b587f7858-prp5n" Jul 2 07:55:10.376588 systemd[1]: Created slice kubepods-besteffort-podb069419b_dc7a_4e7d_9cda_fc703135fa9d.slice. Jul 2 07:55:10.393542 kubelet[2153]: I0702 07:55:10.393509 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a65d2567-2f75-431c-80a3-f422f35eb692-calico-apiserver-certs\") pod \"calico-apiserver-6b587f7858-pqcfv\" (UID: \"a65d2567-2f75-431c-80a3-f422f35eb692\") " pod="calico-apiserver/calico-apiserver-6b587f7858-pqcfv" Jul 2 07:55:10.393718 kubelet[2153]: I0702 07:55:10.393579 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b069419b-dc7a-4e7d-9cda-fc703135fa9d-calico-apiserver-certs\") pod \"calico-apiserver-6b587f7858-prp5n\" (UID: \"b069419b-dc7a-4e7d-9cda-fc703135fa9d\") " pod="calico-apiserver/calico-apiserver-6b587f7858-prp5n" Jul 2 07:55:10.393718 kubelet[2153]: I0702 07:55:10.393639 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k7crg\" (UniqueName: \"kubernetes.io/projected/b069419b-dc7a-4e7d-9cda-fc703135fa9d-kube-api-access-k7crg\") pod \"calico-apiserver-6b587f7858-prp5n\" (UID: \"b069419b-dc7a-4e7d-9cda-fc703135fa9d\") " pod="calico-apiserver/calico-apiserver-6b587f7858-prp5n" Jul 2 07:55:10.393718 kubelet[2153]: I0702 07:55:10.393685 2153 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dx8kv\" (UniqueName: \"kubernetes.io/projected/a65d2567-2f75-431c-80a3-f422f35eb692-kube-api-access-dx8kv\") pod \"calico-apiserver-6b587f7858-pqcfv\" (UID: \"a65d2567-2f75-431c-80a3-f422f35eb692\") " pod="calico-apiserver/calico-apiserver-6b587f7858-pqcfv" Jul 2 07:55:10.429905 kernel: kauditd_printk_skb: 451 callbacks suppressed Jul 2 07:55:10.430066 kernel: audit: type=1325 audit(1719906910.421:1194): table=filter:113 family=2 entries=9 op=nft_register_rule pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:10.421000 audit[3973]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:10.421000 audit[3973]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffa0715280 a2=0 a3=7fffa071526c items=0 ppid=2324 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.479941 kernel: audit: type=1300 audit(1719906910.421:1194): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffa0715280 a2=0 a3=7fffa071526c items=0 ppid=2324 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:10.494716 kubelet[2153]: E0702 07:55:10.494675 2153 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:55:10.495056 kubelet[2153]: E0702 07:55:10.495037 2153 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a65d2567-2f75-431c-80a3-f422f35eb692-calico-apiserver-certs podName:a65d2567-2f75-431c-80a3-f422f35eb692 nodeName:}" failed. No retries permitted until 2024-07-02 07:55:10.99499081 +0000 UTC m=+54.345027071 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/a65d2567-2f75-431c-80a3-f422f35eb692-calico-apiserver-certs") pod "calico-apiserver-6b587f7858-pqcfv" (UID: "a65d2567-2f75-431c-80a3-f422f35eb692") : secret "calico-apiserver-certs" not found Jul 2 07:55:10.495537 kubelet[2153]: E0702 07:55:10.495516 2153 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:55:10.495700 kubelet[2153]: E0702 07:55:10.495682 2153 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b069419b-dc7a-4e7d-9cda-fc703135fa9d-calico-apiserver-certs podName:b069419b-dc7a-4e7d-9cda-fc703135fa9d nodeName:}" failed. No retries permitted until 2024-07-02 07:55:10.995664124 +0000 UTC m=+54.345700390 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b069419b-dc7a-4e7d-9cda-fc703135fa9d-calico-apiserver-certs") pod "calico-apiserver-6b587f7858-prp5n" (UID: "b069419b-dc7a-4e7d-9cda-fc703135fa9d") : secret "calico-apiserver-certs" not found Jul 2 07:55:10.451000 audit[3973]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:10.512449 kernel: audit: type=1327 audit(1719906910.421:1194): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:10.512615 kernel: audit: type=1325 audit(1719906910.451:1195): table=nat:114 family=2 entries=20 op=nft_register_rule pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:10.451000 audit[3973]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffa0715280 a2=0 a3=7fffa071526c items=0 ppid=2324 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.546799 kernel: audit: type=1300 audit(1719906910.451:1195): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffa0715280 a2=0 a3=7fffa071526c items=0 ppid=2324 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:10.567956 kernel: audit: type=1327 audit(1719906910.451:1195): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:10.461000 audit[3975]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=3975 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:10.591907 kernel: audit: type=1325 audit(1719906910.461:1196): table=filter:115 family=2 entries=10 op=nft_register_rule pid=3975 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:10.461000 audit[3975]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffea1ee45c0 a2=0 a3=7ffea1ee45ac items=0 ppid=2324 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:10.644083 kernel: audit: type=1300 audit(1719906910.461:1196): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffea1ee45c0 a2=0 a3=7ffea1ee45ac items=0 ppid=2324 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.644237 kernel: audit: type=1327 audit(1719906910.461:1196): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:10.501000 audit[3975]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=3975 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:10.501000 audit[3975]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffea1ee45c0 a2=0 a3=7ffea1ee45ac items=0 ppid=2324 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:10.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:10.661953 kernel: audit: type=1325 audit(1719906910.501:1197): table=nat:116 family=2 entries=20 op=nft_register_rule pid=3975 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:10.997526 kubelet[2153]: E0702 07:55:10.997354 2153 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:55:10.997526 kubelet[2153]: E0702 07:55:10.997455 2153 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a65d2567-2f75-431c-80a3-f422f35eb692-calico-apiserver-certs podName:a65d2567-2f75-431c-80a3-f422f35eb692 nodeName:}" failed. No retries permitted until 2024-07-02 07:55:11.99743174 +0000 UTC m=+55.347467991 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/a65d2567-2f75-431c-80a3-f422f35eb692-calico-apiserver-certs") pod "calico-apiserver-6b587f7858-pqcfv" (UID: "a65d2567-2f75-431c-80a3-f422f35eb692") : secret "calico-apiserver-certs" not found Jul 2 07:55:10.997910 kubelet[2153]: E0702 07:55:10.997354 2153 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:55:10.998106 kubelet[2153]: E0702 07:55:10.998089 2153 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b069419b-dc7a-4e7d-9cda-fc703135fa9d-calico-apiserver-certs podName:b069419b-dc7a-4e7d-9cda-fc703135fa9d nodeName:}" failed. No retries permitted until 2024-07-02 07:55:11.99806146 +0000 UTC m=+55.348097721 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b069419b-dc7a-4e7d-9cda-fc703135fa9d-calico-apiserver-certs") pod "calico-apiserver-6b587f7858-prp5n" (UID: "b069419b-dc7a-4e7d-9cda-fc703135fa9d") : secret "calico-apiserver-certs" not found Jul 2 07:55:12.140505 env[1235]: time="2024-07-02T07:55:12.140445404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b587f7858-pqcfv,Uid:a65d2567-2f75-431c-80a3-f422f35eb692,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:55:12.195488 env[1235]: time="2024-07-02T07:55:12.195435652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b587f7858-prp5n,Uid:b069419b-dc7a-4e7d-9cda-fc703135fa9d,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:55:12.415993 systemd-networkd[1034]: cali4f0120aee9e: Link UP Jul 2 07:55:12.423047 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:55:12.431981 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f0120aee9e: link becomes ready Jul 2 07:55:12.438690 systemd-networkd[1034]: cali4f0120aee9e: Gained carrier Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.260 [INFO][3982] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0 calico-apiserver-6b587f7858- calico-apiserver a65d2567-2f75-431c-80a3-f422f35eb692 836 0 2024-07-02 07:55:10 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b587f7858 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal calico-apiserver-6b587f7858-pqcfv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4f0120aee9e [] []}} ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-pqcfv" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.260 [INFO][3982] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-pqcfv" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.342 [INFO][4004] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" HandleID="k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.358 [INFO][4004] ipam_plugin.go 264: Auto assigning IP ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" HandleID="k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ee050), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", "pod":"calico-apiserver-6b587f7858-pqcfv", "timestamp":"2024-07-02 07:55:12.34256051 +0000 UTC"}, Hostname:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.358 [INFO][4004] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.358 [INFO][4004] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.358 [INFO][4004] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal' Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.364 [INFO][4004] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.374 [INFO][4004] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.380 [INFO][4004] ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.383 [INFO][4004] ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.387 [INFO][4004] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.387 [INFO][4004] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.389 [INFO][4004] ipam.go 1685: Creating new handle: k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.396 [INFO][4004] ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.402 [INFO][4004] ipam.go 1216: Successfully claimed IPs: [192.168.15.197/26] block=192.168.15.192/26 handle="k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.403 [INFO][4004] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.197/26] handle="k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.403 [INFO][4004] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:12.469583 env[1235]: 2024-07-02 07:55:12.403 [INFO][4004] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.15.197/26] IPv6=[] ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" HandleID="k8s-pod-network.3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" Jul 2 07:55:12.470950 env[1235]: 2024-07-02 07:55:12.405 [INFO][3982] k8s.go 386: Populated endpoint ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-pqcfv" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0", GenerateName:"calico-apiserver-6b587f7858-", Namespace:"calico-apiserver", SelfLink:"", UID:"a65d2567-2f75-431c-80a3-f422f35eb692", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b587f7858", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-6b587f7858-pqcfv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f0120aee9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:12.470950 env[1235]: 2024-07-02 07:55:12.406 [INFO][3982] k8s.go 387: Calico CNI using IPs: [192.168.15.197/32] ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-pqcfv" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" Jul 2 07:55:12.470950 env[1235]: 2024-07-02 07:55:12.406 [INFO][3982] dataplane_linux.go 68: Setting the host side veth name to cali4f0120aee9e ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-pqcfv" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" Jul 2 07:55:12.470950 env[1235]: 2024-07-02 07:55:12.446 [INFO][3982] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-pqcfv" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" Jul 2 07:55:12.470950 env[1235]: 2024-07-02 07:55:12.446 [INFO][3982] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-pqcfv" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0", GenerateName:"calico-apiserver-6b587f7858-", Namespace:"calico-apiserver", SelfLink:"", UID:"a65d2567-2f75-431c-80a3-f422f35eb692", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b587f7858", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce", Pod:"calico-apiserver-6b587f7858-pqcfv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f0120aee9e", MAC:"fe:6c:f8:e8:52:91", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:12.470950 env[1235]: 2024-07-02 07:55:12.467 [INFO][3982] k8s.go 500: Wrote updated endpoint to datastore ContainerID="3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-pqcfv" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--pqcfv-eth0" Jul 2 07:55:12.502252 env[1235]: time="2024-07-02T07:55:12.502150408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:12.502466 env[1235]: time="2024-07-02T07:55:12.502266744Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:12.502466 env[1235]: time="2024-07-02T07:55:12.502307330Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:12.502621 env[1235]: time="2024-07-02T07:55:12.502514194Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce pid=4039 runtime=io.containerd.runc.v2 Jul 2 07:55:12.541767 systemd[1]: Started cri-containerd-3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce.scope. Jul 2 07:55:12.548626 systemd-networkd[1034]: cali4f54e84e981: Link UP Jul 2 07:55:12.558991 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f54e84e981: link becomes ready Jul 2 07:55:12.559922 systemd-networkd[1034]: cali4f54e84e981: Gained carrier Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.299 [INFO][3991] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0 calico-apiserver-6b587f7858- calico-apiserver b069419b-dc7a-4e7d-9cda-fc703135fa9d 844 0 2024-07-02 07:55:10 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b587f7858 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal calico-apiserver-6b587f7858-prp5n eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4f54e84e981 [] []}} ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-prp5n" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.299 [INFO][3991] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-prp5n" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.365 [INFO][4011] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" HandleID="k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.379 [INFO][4011] ipam_plugin.go 264: Auto assigning IP ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" HandleID="k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030d2a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", "pod":"calico-apiserver-6b587f7858-prp5n", "timestamp":"2024-07-02 07:55:12.365792081 +0000 UTC"}, Hostname:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.379 [INFO][4011] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.403 [INFO][4011] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.403 [INFO][4011] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal' Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.411 [INFO][4011] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.424 [INFO][4011] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.445 [INFO][4011] ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.456 [INFO][4011] ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.475 [INFO][4011] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.475 [INFO][4011] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.480 [INFO][4011] ipam.go 1685: Creating new handle: k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1 Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.487 [INFO][4011] ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.504 [INFO][4011] ipam.go 1216: Successfully claimed IPs: [192.168.15.198/26] block=192.168.15.192/26 handle="k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.505 [INFO][4011] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.198/26] handle="k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" host="ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal" Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.505 [INFO][4011] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:12.578350 env[1235]: 2024-07-02 07:55:12.505 [INFO][4011] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.15.198/26] IPv6=[] ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" HandleID="k8s-pod-network.5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" Jul 2 07:55:12.579651 env[1235]: 2024-07-02 07:55:12.506 [INFO][3991] k8s.go 386: Populated endpoint ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-prp5n" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0", GenerateName:"calico-apiserver-6b587f7858-", Namespace:"calico-apiserver", SelfLink:"", UID:"b069419b-dc7a-4e7d-9cda-fc703135fa9d", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b587f7858", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-6b587f7858-prp5n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f54e84e981", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:12.579651 env[1235]: 2024-07-02 07:55:12.507 [INFO][3991] k8s.go 387: Calico CNI using IPs: [192.168.15.198/32] ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-prp5n" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" Jul 2 07:55:12.579651 env[1235]: 2024-07-02 07:55:12.507 [INFO][3991] dataplane_linux.go 68: Setting the host side veth name to cali4f54e84e981 ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-prp5n" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" Jul 2 07:55:12.579651 env[1235]: 2024-07-02 07:55:12.561 [INFO][3991] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-prp5n" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" Jul 2 07:55:12.579651 env[1235]: 2024-07-02 07:55:12.561 [INFO][3991] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-prp5n" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0", GenerateName:"calico-apiserver-6b587f7858-", Namespace:"calico-apiserver", SelfLink:"", UID:"b069419b-dc7a-4e7d-9cda-fc703135fa9d", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b587f7858", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1", Pod:"calico-apiserver-6b587f7858-prp5n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f54e84e981", MAC:"82:f5:aa:ce:10:b2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:12.579651 env[1235]: 2024-07-02 07:55:12.576 [INFO][3991] k8s.go 500: Wrote updated endpoint to datastore ContainerID="5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1" Namespace="calico-apiserver" Pod="calico-apiserver-6b587f7858-prp5n" WorkloadEndpoint="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--apiserver--6b587f7858--prp5n-eth0" Jul 2 07:55:12.582000 audit[4063]: NETFILTER_CFG table=filter:117 family=2 entries=55 op=nft_register_chain pid=4063 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:12.582000 audit[4063]: SYSCALL arch=c000003e syscall=46 success=yes exit=27464 a0=3 a1=7ffcbbece8c0 a2=0 a3=7ffcbbece8ac items=0 ppid=3131 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:12.608068 env[1235]: time="2024-07-02T07:55:12.607942824Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:12.608273 env[1235]: time="2024-07-02T07:55:12.608068576Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:12.608273 env[1235]: time="2024-07-02T07:55:12.608109936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:12.613270 env[1235]: time="2024-07-02T07:55:12.613190154Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1 pid=4083 runtime=io.containerd.runc.v2 Jul 2 07:55:12.647516 systemd[1]: Started cri-containerd-5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1.scope. Jul 2 07:55:12.676000 audit[4109]: NETFILTER_CFG table=filter:118 family=2 entries=55 op=nft_register_chain pid=4109 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:12.676000 audit[4109]: SYSCALL arch=c000003e syscall=46 success=yes exit=27152 a0=3 a1=7ffc19c1e3f0 a2=0 a3=7ffc19c1e3dc items=0 ppid=3131 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.676000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit: BPF prog-id=183 op=LOAD Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4039 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316633306662386238343630303234316564636538383264366364 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4039 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316633306662386238343630303234316564636538383264366364 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit: BPF prog-id=184 op=LOAD Jul 2 07:55:12.692000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002136c0 items=0 ppid=4039 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316633306662386238343630303234316564636538383264366364 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.692000 audit: BPF prog-id=185 op=LOAD Jul 2 07:55:12.692000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000213708 items=0 ppid=4039 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316633306662386238343630303234316564636538383264366364 Jul 2 07:55:12.693000 audit: BPF prog-id=185 op=UNLOAD Jul 2 07:55:12.693000 audit: BPF prog-id=184 op=UNLOAD Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.693000 audit: BPF prog-id=186 op=LOAD Jul 2 07:55:12.693000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000213b18 items=0 ppid=4039 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316633306662386238343630303234316564636538383264366364 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.725000 audit: BPF prog-id=187 op=LOAD Jul 2 07:55:12.727000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.727000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4083 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346664343534363130383035666461323938306433333062323936 Jul 2 07:55:12.727000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.727000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4083 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346664343534363130383035666461323938306433333062323936 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.728000 audit: BPF prog-id=188 op=LOAD Jul 2 07:55:12.728000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255cd0 items=0 ppid=4083 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346664343534363130383035666461323938306433333062323936 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.729000 audit: BPF prog-id=189 op=LOAD Jul 2 07:55:12.729000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d18 items=0 ppid=4083 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346664343534363130383035666461323938306433333062323936 Jul 2 07:55:12.731000 audit: BPF prog-id=189 op=UNLOAD Jul 2 07:55:12.731000 audit: BPF prog-id=188 op=UNLOAD Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:12.731000 audit: BPF prog-id=190 op=LOAD Jul 2 07:55:12.731000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00036c128 items=0 ppid=4083 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:12.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346664343534363130383035666461323938306433333062323936 Jul 2 07:55:12.771078 env[1235]: time="2024-07-02T07:55:12.771018949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b587f7858-pqcfv,Uid:a65d2567-2f75-431c-80a3-f422f35eb692,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce\"" Jul 2 07:55:12.774991 env[1235]: time="2024-07-02T07:55:12.774945242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:55:12.818353 env[1235]: time="2024-07-02T07:55:12.818296569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b587f7858-prp5n,Uid:b069419b-dc7a-4e7d-9cda-fc703135fa9d,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1\"" Jul 2 07:55:12.818000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:12.818000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c013a0fe60 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:55:12.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:55:12.834000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:12.834000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c013f836e0 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:55:12.834000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:55:12.834000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:12.834000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00a3d2280 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:55:12.834000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:55:12.844000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:12.844000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c013f83bc0 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:55:12.844000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:55:13.019000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:13.019000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0046caae0 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:55:13.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:55:13.021000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:13.021000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00a3d33a0 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:55:13.021000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:55:13.195000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:13.195000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:13.195000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f2e7c0 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:55:13.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:13.195000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001e83500 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:55:13.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:14.232841 systemd-networkd[1034]: cali4f0120aee9e: Gained IPv6LL Jul 2 07:55:14.424636 systemd-networkd[1034]: cali4f54e84e981: Gained IPv6LL Jul 2 07:55:15.416247 env[1235]: time="2024-07-02T07:55:15.416185695Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:15.419940 env[1235]: time="2024-07-02T07:55:15.419862789Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:15.421322 env[1235]: time="2024-07-02T07:55:15.421285370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:15.423484 env[1235]: time="2024-07-02T07:55:15.423443622Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:15.424601 env[1235]: time="2024-07-02T07:55:15.424550393Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:55:15.428278 env[1235]: time="2024-07-02T07:55:15.426231207Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:55:15.430584 env[1235]: time="2024-07-02T07:55:15.430539724Z" level=info msg="CreateContainer within sandbox \"3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:55:15.456996 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1390402484.mount: Deactivated successfully. Jul 2 07:55:15.460666 env[1235]: time="2024-07-02T07:55:15.457696681Z" level=info msg="CreateContainer within sandbox \"3d1f30fb8b84600241edce882d6cd449e7679e1b7ed83e80466b674b72c926ce\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"874da47ad20c6a97d506e7ce329bf314d6743fc0707b85273998fd086adc706f\"" Jul 2 07:55:15.460666 env[1235]: time="2024-07-02T07:55:15.458718110Z" level=info msg="StartContainer for \"874da47ad20c6a97d506e7ce329bf314d6743fc0707b85273998fd086adc706f\"" Jul 2 07:55:15.510170 systemd[1]: run-containerd-runc-k8s.io-874da47ad20c6a97d506e7ce329bf314d6743fc0707b85273998fd086adc706f-runc.6NjYWB.mount: Deactivated successfully. Jul 2 07:55:15.524235 systemd[1]: Started cri-containerd-874da47ad20c6a97d506e7ce329bf314d6743fc0707b85273998fd086adc706f.scope. Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579624 kernel: kauditd_printk_skb: 146 callbacks suppressed Jul 2 07:55:15.579777 kernel: audit: type=1400 audit(1719906915.552:1244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.623373 kernel: audit: type=1400 audit(1719906915.552:1245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.623543 kernel: audit: type=1400 audit(1719906915.552:1246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.644674 kernel: audit: type=1400 audit(1719906915.552:1247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.667101 kernel: audit: type=1400 audit(1719906915.552:1248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.667181 kernel: audit: type=1400 audit(1719906915.552:1249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.732690 kernel: audit: type=1400 audit(1719906915.552:1250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.732891 kernel: audit: type=1400 audit(1719906915.552:1251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.753909 kernel: audit: type=1400 audit(1719906915.552:1252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.757898 env[1235]: time="2024-07-02T07:55:15.757841562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:15.762383 env[1235]: time="2024-07-02T07:55:15.762334270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:15.766645 env[1235]: time="2024-07-02T07:55:15.766597458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:15.776915 kernel: audit: type=1400 audit(1719906915.552:1253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.777660 env[1235]: time="2024-07-02T07:55:15.777616329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:15.779547 env[1235]: time="2024-07-02T07:55:15.779472856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:55:15.552000 audit: BPF prog-id=191 op=LOAD Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4039 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346461343761643230633661393764353036653763653332396266 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4039 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346461343761643230633661393764353036653763653332396266 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit: BPF prog-id=192 op=LOAD Jul 2 07:55:15.579000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024830 items=0 ppid=4039 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346461343761643230633661393764353036653763653332396266 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit: BPF prog-id=193 op=LOAD Jul 2 07:55:15.579000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024878 items=0 ppid=4039 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346461343761643230633661393764353036653763653332396266 Jul 2 07:55:15.579000 audit: BPF prog-id=193 op=UNLOAD Jul 2 07:55:15.579000 audit: BPF prog-id=192 op=UNLOAD Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.579000 audit: BPF prog-id=194 op=LOAD Jul 2 07:55:15.579000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024c88 items=0 ppid=4039 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346461343761643230633661393764353036653763653332396266 Jul 2 07:55:15.727000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:15.727000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f2ed60 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:55:15.727000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:15.729000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:15.729000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f2f020 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:55:15.729000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:15.730000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:15.730000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f2f360 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:55:15.730000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:15.732000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:15.786344 env[1235]: time="2024-07-02T07:55:15.784104261Z" level=info msg="CreateContainer within sandbox \"5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:55:15.732000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00118b640 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:55:15.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:15.812807 env[1235]: time="2024-07-02T07:55:15.812716006Z" level=info msg="CreateContainer within sandbox \"5f4fd454610805fda2980d330b296630e8739b2539ccc29426337d1e76b3b4e1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e943dd3f2d71d3dea935a2e529fb4d5b93029352cb2ab01363ecca9cb8065fd1\"" Jul 2 07:55:15.813541 env[1235]: time="2024-07-02T07:55:15.813479367Z" level=info msg="StartContainer for \"874da47ad20c6a97d506e7ce329bf314d6743fc0707b85273998fd086adc706f\" returns successfully" Jul 2 07:55:15.814175 env[1235]: time="2024-07-02T07:55:15.814134962Z" level=info msg="StartContainer for \"e943dd3f2d71d3dea935a2e529fb4d5b93029352cb2ab01363ecca9cb8065fd1\"" Jul 2 07:55:15.843034 systemd[1]: Started cri-containerd-e943dd3f2d71d3dea935a2e529fb4d5b93029352cb2ab01363ecca9cb8065fd1.scope. Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.892000 audit: BPF prog-id=195 op=LOAD Jul 2 07:55:15.893000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.893000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4083 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343364643366326437316433646561393335613265353239666234 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4083 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343364643366326437316433646561393335613265353239666234 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.894000 audit: BPF prog-id=196 op=LOAD Jul 2 07:55:15.894000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a8560 items=0 ppid=4083 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343364643366326437316433646561393335613265353239666234 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.896000 audit: BPF prog-id=197 op=LOAD Jul 2 07:55:15.896000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a85a8 items=0 ppid=4083 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343364643366326437316433646561393335613265353239666234 Jul 2 07:55:15.897000 audit: BPF prog-id=197 op=UNLOAD Jul 2 07:55:15.897000 audit: BPF prog-id=196 op=UNLOAD Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:15.897000 audit: BPF prog-id=198 op=LOAD Jul 2 07:55:15.897000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a89b8 items=0 ppid=4083 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:15.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343364643366326437316433646561393335613265353239666234 Jul 2 07:55:15.958445 env[1235]: time="2024-07-02T07:55:15.958241175Z" level=info msg="StartContainer for \"e943dd3f2d71d3dea935a2e529fb4d5b93029352cb2ab01363ecca9cb8065fd1\" returns successfully" Jul 2 07:55:16.378006 kubelet[2153]: I0702 07:55:16.377964 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b587f7858-prp5n" podStartSLOduration=3.419440012 podCreationTimestamp="2024-07-02 07:55:10 +0000 UTC" firstStartedPulling="2024-07-02 07:55:12.82133169 +0000 UTC m=+56.171367950" lastFinishedPulling="2024-07-02 07:55:15.779791413 +0000 UTC m=+59.129827660" observedRunningTime="2024-07-02 07:55:16.341922367 +0000 UTC m=+59.691958636" watchObservedRunningTime="2024-07-02 07:55:16.377899722 +0000 UTC m=+59.727935990" Jul 2 07:55:16.378985 kubelet[2153]: I0702 07:55:16.378957 2153 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b587f7858-pqcfv" podStartSLOduration=3.727763892 podCreationTimestamp="2024-07-02 07:55:10 +0000 UTC" firstStartedPulling="2024-07-02 07:55:12.774080619 +0000 UTC m=+56.124116874" lastFinishedPulling="2024-07-02 07:55:15.425226933 +0000 UTC m=+58.775263204" observedRunningTime="2024-07-02 07:55:16.377165572 +0000 UTC m=+59.727201863" watchObservedRunningTime="2024-07-02 07:55:16.378910222 +0000 UTC m=+59.728946489" Jul 2 07:55:16.408000 audit[4219]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:16.408000 audit[4219]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffccec50af0 a2=0 a3=7ffccec50adc items=0 ppid=2324 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:16.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:16.415000 audit[4219]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:16.415000 audit[4219]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffccec50af0 a2=0 a3=7ffccec50adc items=0 ppid=2324 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:16.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:16.452000 audit[4222]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:16.452000 audit[4222]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd576ecf70 a2=0 a3=7ffd576ecf5c items=0 ppid=2324 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:16.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:16.454000 audit[4222]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:16.454000 audit[4222]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd576ecf70 a2=0 a3=7ffd576ecf5c items=0 ppid=2324 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:16.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:16.918913 env[1235]: time="2024-07-02T07:55:16.918643596Z" level=info msg="StopPodSandbox for \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\"" Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.123 [WARNING][4238] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"af28b2ce-db18-4892-abe4-8757652fa27c", ResourceVersion:"736", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07", Pod:"coredns-5dd5756b68-vknkw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali97264612a39", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.124 [INFO][4238] k8s.go 608: Cleaning up netns ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.124 [INFO][4238] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" iface="eth0" netns="" Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.124 [INFO][4238] k8s.go 615: Releasing IP address(es) ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.124 [INFO][4238] utils.go 188: Calico CNI releasing IP address ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.192 [INFO][4247] ipam_plugin.go 411: Releasing address using handleID ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.192 [INFO][4247] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.192 [INFO][4247] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.202 [WARNING][4247] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.202 [INFO][4247] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.204 [INFO][4247] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:17.209933 env[1235]: 2024-07-02 07:55:17.208 [INFO][4238] k8s.go 621: Teardown processing complete. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:55:17.211027 env[1235]: time="2024-07-02T07:55:17.210948886Z" level=info msg="TearDown network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\" successfully" Jul 2 07:55:17.211227 env[1235]: time="2024-07-02T07:55:17.211193932Z" level=info msg="StopPodSandbox for \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\" returns successfully" Jul 2 07:55:17.212155 env[1235]: time="2024-07-02T07:55:17.212095718Z" level=info msg="RemovePodSandbox for \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\"" Jul 2 07:55:17.212288 env[1235]: time="2024-07-02T07:55:17.212137765Z" level=info msg="Forcibly stopping sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\"" Jul 2 07:55:17.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.108:22-147.75.109.163:57158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:17.328281 systemd[1]: Started sshd@7-10.128.0.108:22-147.75.109.163:57158.service. Jul 2 07:55:17.344960 kubelet[2153]: I0702 07:55:17.343088 2153 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:55:17.344960 kubelet[2153]: I0702 07:55:17.343966 2153 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:55:17.481126 systemd[1]: run-containerd-runc-k8s.io-b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76-runc.oZ9fT3.mount: Deactivated successfully. Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.288 [WARNING][4266] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"af28b2ce-db18-4892-abe4-8757652fa27c", ResourceVersion:"736", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"1f73d82bd0603e1f24cc3a58abb4cc6840a28d3c232f84999f512ff2e4544d07", Pod:"coredns-5dd5756b68-vknkw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali97264612a39", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.289 [INFO][4266] k8s.go 608: Cleaning up netns ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.289 [INFO][4266] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" iface="eth0" netns="" Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.289 [INFO][4266] k8s.go 615: Releasing IP address(es) ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.289 [INFO][4266] utils.go 188: Calico CNI releasing IP address ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.432 [INFO][4272] ipam_plugin.go 411: Releasing address using handleID ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.432 [INFO][4272] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.432 [INFO][4272] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.448 [WARNING][4272] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.448 [INFO][4272] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" HandleID="k8s-pod-network.b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--vknkw-eth0" Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.455 [INFO][4272] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:17.487230 env[1235]: 2024-07-02 07:55:17.458 [INFO][4266] k8s.go 621: Teardown processing complete. ContainerID="b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7" Jul 2 07:55:17.487230 env[1235]: time="2024-07-02T07:55:17.486462557Z" level=info msg="TearDown network for sandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\" successfully" Jul 2 07:55:17.501235 env[1235]: time="2024-07-02T07:55:17.501130491Z" level=info msg="RemovePodSandbox \"b22803cdd2ba7a87c3b318d85efc41f20f7302088a123ee06295b94c616826f7\" returns successfully" Jul 2 07:55:17.502155 env[1235]: time="2024-07-02T07:55:17.502112482Z" level=info msg="StopPodSandbox for \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\"" Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.594 [WARNING][4312] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e68b892-4c7b-4e50-9b51-2c98308fc107", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7", Pod:"csi-node-driver-928qd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.15.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliea7075fd151", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.595 [INFO][4312] k8s.go 608: Cleaning up netns ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.595 [INFO][4312] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" iface="eth0" netns="" Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.595 [INFO][4312] k8s.go 615: Releasing IP address(es) ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.595 [INFO][4312] utils.go 188: Calico CNI releasing IP address ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.648 [INFO][4318] ipam_plugin.go 411: Releasing address using handleID ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.649 [INFO][4318] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.649 [INFO][4318] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.666 [WARNING][4318] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.666 [INFO][4318] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.671 [INFO][4318] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:17.674544 env[1235]: 2024-07-02 07:55:17.672 [INFO][4312] k8s.go 621: Teardown processing complete. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:17.677369 env[1235]: time="2024-07-02T07:55:17.677313098Z" level=info msg="TearDown network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\" successfully" Jul 2 07:55:17.677592 env[1235]: time="2024-07-02T07:55:17.677555160Z" level=info msg="StopPodSandbox for \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\" returns successfully" Jul 2 07:55:17.678829 env[1235]: time="2024-07-02T07:55:17.678782867Z" level=info msg="RemovePodSandbox for \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\"" Jul 2 07:55:17.679305 env[1235]: time="2024-07-02T07:55:17.679226278Z" level=info msg="Forcibly stopping sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\"" Jul 2 07:55:17.705000 audit[4277]: USER_ACCT pid=4277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:17.708262 sshd[4277]: Accepted publickey for core from 147.75.109.163 port 57158 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:17.707000 audit[4277]: CRED_ACQ pid=4277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:17.707000 audit[4277]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc47b78f10 a2=3 a3=0 items=0 ppid=1 pid=4277 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:17.707000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:17.709502 sshd[4277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:17.726609 systemd-logind[1224]: New session 8 of user core. Jul 2 07:55:17.728123 systemd[1]: Started session-8.scope. Jul 2 07:55:17.740000 audit[4277]: USER_START pid=4277 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:17.743000 audit[4350]: CRED_ACQ pid=4350 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.785 [WARNING][4341] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e68b892-4c7b-4e50-9b51-2c98308fc107", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"9aebbfe7204f458b6c46c07cb18b2368171e0eb588c49cd7afb9b912a9527fb7", Pod:"csi-node-driver-928qd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.15.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliea7075fd151", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.785 [INFO][4341] k8s.go 608: Cleaning up netns ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.785 [INFO][4341] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" iface="eth0" netns="" Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.785 [INFO][4341] k8s.go 615: Releasing IP address(es) ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.786 [INFO][4341] utils.go 188: Calico CNI releasing IP address ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.863 [INFO][4352] ipam_plugin.go 411: Releasing address using handleID ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.866 [INFO][4352] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.866 [INFO][4352] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.875 [WARNING][4352] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.875 [INFO][4352] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" HandleID="k8s-pod-network.f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-csi--node--driver--928qd-eth0" Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.888 [INFO][4352] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:17.892000 env[1235]: 2024-07-02 07:55:17.890 [INFO][4341] k8s.go 621: Teardown processing complete. ContainerID="f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb" Jul 2 07:55:17.892864 env[1235]: time="2024-07-02T07:55:17.892050356Z" level=info msg="TearDown network for sandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\" successfully" Jul 2 07:55:17.899132 env[1235]: time="2024-07-02T07:55:17.899027650Z" level=info msg="RemovePodSandbox \"f38ff3c8e73f64a8cffe27c7164cd208bc2642e9c41e9220e1dd4d60d4037aeb\" returns successfully" Jul 2 07:55:17.899820 env[1235]: time="2024-07-02T07:55:17.899759167Z" level=info msg="StopPodSandbox for \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\"" Jul 2 07:55:18.003000 audit[4153]: AVC avc: denied { watch } for pid=4153 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_55_12.1529087974/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c269,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c269,c992 tclass=file permissive=0 Jul 2 07:55:18.003000 audit[4153]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010769c0 a2=fc6 a3=0 items=0 ppid=4039 pid=4153 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c269,c992 key=(null) Jul 2 07:55:18.003000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.011 [WARNING][4378] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9e97620e-d188-4284-b33f-e2b87abc8e79", ResourceVersion:"768", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b", Pod:"coredns-5dd5756b68-fljks", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia520123a5ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.027 [INFO][4378] k8s.go 608: Cleaning up netns ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.027 [INFO][4378] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" iface="eth0" netns="" Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.027 [INFO][4378] k8s.go 615: Releasing IP address(es) ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.027 [INFO][4378] utils.go 188: Calico CNI releasing IP address ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.101 [INFO][4384] ipam_plugin.go 411: Releasing address using handleID ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.101 [INFO][4384] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.102 [INFO][4384] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.111 [WARNING][4384] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.111 [INFO][4384] ipam_plugin.go 439: Releasing address using workloadID ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.113 [INFO][4384] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:18.116028 env[1235]: 2024-07-02 07:55:18.114 [INFO][4378] k8s.go 621: Teardown processing complete. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:18.117355 env[1235]: time="2024-07-02T07:55:18.116063585Z" level=info msg="TearDown network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\" successfully" Jul 2 07:55:18.117355 env[1235]: time="2024-07-02T07:55:18.116104342Z" level=info msg="StopPodSandbox for \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\" returns successfully" Jul 2 07:55:18.118092 env[1235]: time="2024-07-02T07:55:18.118053864Z" level=info msg="RemovePodSandbox for \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\"" Jul 2 07:55:18.118465 env[1235]: time="2024-07-02T07:55:18.118390189Z" level=info msg="Forcibly stopping sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\"" Jul 2 07:55:18.128234 sshd[4277]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:18.129000 audit[4277]: USER_END pid=4277 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:18.129000 audit[4277]: CRED_DISP pid=4277 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:18.133331 systemd[1]: sshd@7-10.128.0.108:22-147.75.109.163:57158.service: Deactivated successfully. Jul 2 07:55:18.134652 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:55:18.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.108:22-147.75.109.163:57158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:18.136813 systemd-logind[1224]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:55:18.139544 systemd-logind[1224]: Removed session 8. Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.199 [WARNING][4406] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9e97620e-d188-4284-b33f-e2b87abc8e79", ResourceVersion:"768", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"05877666fa63a114c551fca7c08f302786f5b1d6c743a1e74d2e583f0a19a99b", Pod:"coredns-5dd5756b68-fljks", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia520123a5ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.199 [INFO][4406] k8s.go 608: Cleaning up netns ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.199 [INFO][4406] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" iface="eth0" netns="" Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.200 [INFO][4406] k8s.go 615: Releasing IP address(es) ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.200 [INFO][4406] utils.go 188: Calico CNI releasing IP address ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.238 [INFO][4412] ipam_plugin.go 411: Releasing address using handleID ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.239 [INFO][4412] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.239 [INFO][4412] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.248 [WARNING][4412] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.248 [INFO][4412] ipam_plugin.go 439: Releasing address using workloadID ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" HandleID="k8s-pod-network.fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--fljks-eth0" Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.251 [INFO][4412] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:18.256078 env[1235]: 2024-07-02 07:55:18.253 [INFO][4406] k8s.go 621: Teardown processing complete. ContainerID="fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1" Jul 2 07:55:18.256078 env[1235]: time="2024-07-02T07:55:18.256035938Z" level=info msg="TearDown network for sandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\" successfully" Jul 2 07:55:18.262058 env[1235]: time="2024-07-02T07:55:18.261993901Z" level=info msg="RemovePodSandbox \"fec9248f2d2aa63cb4ba058f43f178e9c04bca2d5a31beb5abc7f0bbbef446e1\" returns successfully" Jul 2 07:55:18.262938 env[1235]: time="2024-07-02T07:55:18.262903388Z" level=info msg="StopPodSandbox for \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\"" Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.332 [WARNING][4431] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0", GenerateName:"calico-kube-controllers-668d55d57d-", Namespace:"calico-system", SelfLink:"", UID:"42d413e6-f6b6-45e1-aeb3-5b2079fd6746", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"668d55d57d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621", Pod:"calico-kube-controllers-668d55d57d-qdjvj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.15.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali82ed425c1c1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.332 [INFO][4431] k8s.go 608: Cleaning up netns ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.332 [INFO][4431] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" iface="eth0" netns="" Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.332 [INFO][4431] k8s.go 615: Releasing IP address(es) ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.332 [INFO][4431] utils.go 188: Calico CNI releasing IP address ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.396 [INFO][4437] ipam_plugin.go 411: Releasing address using handleID ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.397 [INFO][4437] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.397 [INFO][4437] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.408 [WARNING][4437] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.408 [INFO][4437] ipam_plugin.go 439: Releasing address using workloadID ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.411 [INFO][4437] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:18.413802 env[1235]: 2024-07-02 07:55:18.412 [INFO][4431] k8s.go 621: Teardown processing complete. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:55:18.414685 env[1235]: time="2024-07-02T07:55:18.413848483Z" level=info msg="TearDown network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\" successfully" Jul 2 07:55:18.414685 env[1235]: time="2024-07-02T07:55:18.413906653Z" level=info msg="StopPodSandbox for \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\" returns successfully" Jul 2 07:55:18.414685 env[1235]: time="2024-07-02T07:55:18.414522311Z" level=info msg="RemovePodSandbox for \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\"" Jul 2 07:55:18.414685 env[1235]: time="2024-07-02T07:55:18.414565060Z" level=info msg="Forcibly stopping sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\"" Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.472 [WARNING][4456] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0", GenerateName:"calico-kube-controllers-668d55d57d-", Namespace:"calico-system", SelfLink:"", UID:"42d413e6-f6b6-45e1-aeb3-5b2079fd6746", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"668d55d57d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-f76399a0a80fc1b7b0be.c.flatcar-212911.internal", ContainerID:"d5b08d5a36c67de5116987917f6a110ed07ec101898f43625805696c8f18c621", Pod:"calico-kube-controllers-668d55d57d-qdjvj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.15.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali82ed425c1c1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.472 [INFO][4456] k8s.go 608: Cleaning up netns ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.473 [INFO][4456] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" iface="eth0" netns="" Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.473 [INFO][4456] k8s.go 615: Releasing IP address(es) ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.473 [INFO][4456] utils.go 188: Calico CNI releasing IP address ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.512 [INFO][4463] ipam_plugin.go 411: Releasing address using handleID ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.513 [INFO][4463] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.513 [INFO][4463] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.521 [WARNING][4463] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.521 [INFO][4463] ipam_plugin.go 439: Releasing address using workloadID ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" HandleID="k8s-pod-network.64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Workload="ci--3510--3--5--f76399a0a80fc1b7b0be.c.flatcar--212911.internal-k8s-calico--kube--controllers--668d55d57d--qdjvj-eth0" Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.523 [INFO][4463] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:18.527268 env[1235]: 2024-07-02 07:55:18.524 [INFO][4456] k8s.go 621: Teardown processing complete. ContainerID="64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75" Jul 2 07:55:18.528395 env[1235]: time="2024-07-02T07:55:18.528338776Z" level=info msg="TearDown network for sandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\" successfully" Jul 2 07:55:18.533891 env[1235]: time="2024-07-02T07:55:18.533786038Z" level=info msg="RemovePodSandbox \"64de8f148ab673612b7a1514986a9af5c75628032c6efb00e0c1087f798c8a75\" returns successfully" Jul 2 07:55:18.736000 audit[4190]: AVC avc: denied { watch } for pid=4190 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_55_12.1860505197/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c179,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c179,c506 tclass=file permissive=0 Jul 2 07:55:18.736000 audit[4190]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a6f940 a2=fc6 a3=0 items=0 ppid=4083 pid=4190 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c179,c506 key=(null) Jul 2 07:55:18.736000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:55:23.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.108:22-147.75.109.163:46496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:23.178720 systemd[1]: Started sshd@8-10.128.0.108:22-147.75.109.163:46496.service. Jul 2 07:55:23.185856 kernel: kauditd_printk_skb: 145 callbacks suppressed Jul 2 07:55:23.186045 kernel: audit: type=1130 audit(1719906923.179:1299): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.108:22-147.75.109.163:46496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:23.481000 audit[4472]: USER_ACCT pid=4472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.512871 sshd[4472]: Accepted publickey for core from 147.75.109.163 port 46496 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:23.513417 kernel: audit: type=1101 audit(1719906923.481:1300): pid=4472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.513000 audit[4472]: CRED_ACQ pid=4472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.515176 sshd[4472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:23.527223 systemd[1]: Started session-9.scope. Jul 2 07:55:23.529402 systemd-logind[1224]: New session 9 of user core. Jul 2 07:55:23.541557 kernel: audit: type=1103 audit(1719906923.513:1301): pid=4472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.513000 audit[4472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e091400 a2=3 a3=0 items=0 ppid=1 pid=4472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.586295 kernel: audit: type=1006 audit(1719906923.513:1302): pid=4472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Jul 2 07:55:23.586482 kernel: audit: type=1300 audit(1719906923.513:1302): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e091400 a2=3 a3=0 items=0 ppid=1 pid=4472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.586956 kernel: audit: type=1327 audit(1719906923.513:1302): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:23.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:23.540000 audit[4472]: USER_START pid=4472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.628805 kernel: audit: type=1105 audit(1719906923.540:1303): pid=4472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.540000 audit[4474]: CRED_ACQ pid=4474 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.653918 kernel: audit: type=1103 audit(1719906923.540:1304): pid=4474 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.802230 sshd[4472]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:23.803000 audit[4472]: USER_END pid=4472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.807046 systemd[1]: sshd@8-10.128.0.108:22-147.75.109.163:46496.service: Deactivated successfully. Jul 2 07:55:23.808250 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:55:23.810761 systemd-logind[1224]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:55:23.812389 systemd-logind[1224]: Removed session 9. Jul 2 07:55:23.803000 audit[4472]: CRED_DISP pid=4472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.838058 kernel: audit: type=1106 audit(1719906923.803:1305): pid=4472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.838175 kernel: audit: type=1104 audit(1719906923.803:1306): pid=4472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.108:22-147.75.109.163:46496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:28.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.108:22-147.75.109.163:46512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:28.848448 systemd[1]: Started sshd@9-10.128.0.108:22-147.75.109.163:46512.service. Jul 2 07:55:28.854864 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:55:28.854995 kernel: audit: type=1130 audit(1719906928.848:1308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.108:22-147.75.109.163:46512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:29.143000 audit[4489]: USER_ACCT pid=4489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.145129 sshd[4489]: Accepted publickey for core from 147.75.109.163 port 46512 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:29.174984 kernel: audit: type=1101 audit(1719906929.143:1309): pid=4489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.174000 audit[4489]: CRED_ACQ pid=4489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.176252 sshd[4489]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:29.191060 systemd[1]: Started session-10.scope. Jul 2 07:55:29.193491 systemd-logind[1224]: New session 10 of user core. Jul 2 07:55:29.202620 kernel: audit: type=1103 audit(1719906929.174:1310): pid=4489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.202756 kernel: audit: type=1006 audit(1719906929.174:1311): pid=4489 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 07:55:29.221337 kernel: audit: type=1300 audit(1719906929.174:1311): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3a798cb0 a2=3 a3=0 items=0 ppid=1 pid=4489 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.174000 audit[4489]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3a798cb0 a2=3 a3=0 items=0 ppid=1 pid=4489 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:29.248016 kernel: audit: type=1327 audit(1719906929.174:1311): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:29.207000 audit[4489]: USER_START pid=4489 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.289794 kernel: audit: type=1105 audit(1719906929.207:1312): pid=4489 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.211000 audit[4491]: CRED_ACQ pid=4491 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.315921 kernel: audit: type=1103 audit(1719906929.211:1313): pid=4491 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.496304 sshd[4489]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:29.497000 audit[4489]: USER_END pid=4489 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.501243 systemd-logind[1224]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:55:29.503479 systemd[1]: sshd@9-10.128.0.108:22-147.75.109.163:46512.service: Deactivated successfully. Jul 2 07:55:29.504639 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:55:29.506947 systemd-logind[1224]: Removed session 10. Jul 2 07:55:29.497000 audit[4489]: CRED_DISP pid=4489 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.555734 kernel: audit: type=1106 audit(1719906929.497:1314): pid=4489 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.555952 kernel: audit: type=1104 audit(1719906929.497:1315): pid=4489 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.108:22-147.75.109.163:46512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:33.352235 systemd[1]: run-containerd-runc-k8s.io-b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76-runc.52Ey4m.mount: Deactivated successfully. Jul 2 07:55:34.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.108:22-147.75.109.163:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:34.543449 systemd[1]: Started sshd@10-10.128.0.108:22-147.75.109.163:37986.service. Jul 2 07:55:34.549454 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:55:34.549609 kernel: audit: type=1130 audit(1719906934.542:1317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.108:22-147.75.109.163:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:34.844000 audit[4525]: USER_ACCT pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:34.875044 kernel: audit: type=1101 audit(1719906934.844:1318): pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:34.875185 sshd[4525]: Accepted publickey for core from 147.75.109.163 port 37986 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:34.875854 sshd[4525]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:34.874000 audit[4525]: CRED_ACQ pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:34.906322 kernel: audit: type=1103 audit(1719906934.874:1319): pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:34.906571 systemd-logind[1224]: New session 11 of user core. Jul 2 07:55:34.910563 systemd[1]: Started session-11.scope. Jul 2 07:55:34.925364 kernel: audit: type=1006 audit(1719906934.874:1320): pid=4525 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 2 07:55:34.925496 kernel: audit: type=1300 audit(1719906934.874:1320): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a12cdd0 a2=3 a3=0 items=0 ppid=1 pid=4525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:34.874000 audit[4525]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a12cdd0 a2=3 a3=0 items=0 ppid=1 pid=4525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:34.874000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:34.961639 kernel: audit: type=1327 audit(1719906934.874:1320): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:34.961807 kernel: audit: type=1105 audit(1719906934.923:1321): pid=4525 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:34.923000 audit[4525]: USER_START pid=4525 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:34.998988 kernel: audit: type=1103 audit(1719906934.931:1322): pid=4527 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:34.931000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.187855 sshd[4525]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:35.189000 audit[4525]: USER_END pid=4525 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.194649 systemd[1]: sshd@10-10.128.0.108:22-147.75.109.163:37986.service: Deactivated successfully. Jul 2 07:55:35.195901 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:55:35.198189 systemd-logind[1224]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:55:35.200133 systemd-logind[1224]: Removed session 11. Jul 2 07:55:35.190000 audit[4525]: CRED_DISP pid=4525 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.247757 kernel: audit: type=1106 audit(1719906935.189:1323): pid=4525 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.247946 kernel: audit: type=1104 audit(1719906935.190:1324): pid=4525 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.249523 systemd[1]: Started sshd@11-10.128.0.108:22-147.75.109.163:38002.service. Jul 2 07:55:35.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.108:22-147.75.109.163:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.108:22-147.75.109.163:38002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.534000 audit[4543]: USER_ACCT pid=4543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.536008 sshd[4543]: Accepted publickey for core from 147.75.109.163 port 38002 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:35.535000 audit[4543]: CRED_ACQ pid=4543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.535000 audit[4543]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcece69ce0 a2=3 a3=0 items=0 ppid=1 pid=4543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.535000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:35.537286 sshd[4543]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:35.544968 systemd-logind[1224]: New session 12 of user core. Jul 2 07:55:35.545406 systemd[1]: Started session-12.scope. Jul 2 07:55:35.555000 audit[4543]: USER_START pid=4543 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.558000 audit[4545]: CRED_ACQ pid=4545 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.121548 sshd[4543]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:36.122000 audit[4543]: USER_END pid=4543 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.123000 audit[4543]: CRED_DISP pid=4543 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.127317 systemd-logind[1224]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:55:36.129741 systemd[1]: sshd@11-10.128.0.108:22-147.75.109.163:38002.service: Deactivated successfully. Jul 2 07:55:36.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.108:22-147.75.109.163:38002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.131127 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:55:36.132107 systemd-logind[1224]: Removed session 12. Jul 2 07:55:36.172909 systemd[1]: Started sshd@12-10.128.0.108:22-147.75.109.163:38012.service. Jul 2 07:55:36.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.108:22-147.75.109.163:38012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.462000 audit[4553]: USER_ACCT pid=4553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.464542 sshd[4553]: Accepted publickey for core from 147.75.109.163 port 38012 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:36.464000 audit[4553]: CRED_ACQ pid=4553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.464000 audit[4553]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4ddecd70 a2=3 a3=0 items=0 ppid=1 pid=4553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.464000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:36.465673 sshd[4553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:36.474631 systemd-logind[1224]: New session 13 of user core. Jul 2 07:55:36.475572 systemd[1]: Started session-13.scope. Jul 2 07:55:36.486000 audit[4553]: USER_START pid=4553 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.488000 audit[4555]: CRED_ACQ pid=4555 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.761152 sshd[4553]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:36.762000 audit[4553]: USER_END pid=4553 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.762000 audit[4553]: CRED_DISP pid=4553 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:36.766570 systemd[1]: sshd@12-10.128.0.108:22-147.75.109.163:38012.service: Deactivated successfully. Jul 2 07:55:36.767867 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:55:36.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.108:22-147.75.109.163:38012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.769141 systemd-logind[1224]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:55:36.770536 systemd-logind[1224]: Removed session 13. Jul 2 07:55:37.998556 systemd[1]: run-containerd-runc-k8s.io-3309279b89ac458728090d82ca2b17a63e232232226029a402765b18fe66b26e-runc.RB6bpl.mount: Deactivated successfully. Jul 2 07:55:41.807716 systemd[1]: Started sshd@13-10.128.0.108:22-147.75.109.163:38014.service. Jul 2 07:55:41.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.108:22-147.75.109.163:38014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:41.825681 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:55:41.825911 kernel: audit: type=1130 audit(1719906941.807:1344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.108:22-147.75.109.163:38014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.099000 audit[4596]: USER_ACCT pid=4596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.102178 sshd[4596]: Accepted publickey for core from 147.75.109.163 port 38014 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:42.131951 kernel: audit: type=1101 audit(1719906942.099:1345): pid=4596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.129000 audit[4596]: CRED_ACQ pid=4596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.133322 sshd[4596]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:42.142652 systemd[1]: Started session-14.scope. Jul 2 07:55:42.144763 systemd-logind[1224]: New session 14 of user core. Jul 2 07:55:42.175382 kernel: audit: type=1103 audit(1719906942.129:1346): pid=4596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.175564 kernel: audit: type=1006 audit(1719906942.130:1347): pid=4596 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 2 07:55:42.175636 kernel: audit: type=1300 audit(1719906942.130:1347): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe00a54240 a2=3 a3=0 items=0 ppid=1 pid=4596 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:42.130000 audit[4596]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe00a54240 a2=3 a3=0 items=0 ppid=1 pid=4596 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:42.130000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:42.213734 kernel: audit: type=1327 audit(1719906942.130:1347): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:42.213942 kernel: audit: type=1105 audit(1719906942.153:1348): pid=4596 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.153000 audit[4596]: USER_START pid=4596 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.158000 audit[4598]: CRED_ACQ pid=4598 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.247298 kernel: audit: type=1103 audit(1719906942.158:1349): pid=4598 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.408792 sshd[4596]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:42.409000 audit[4596]: USER_END pid=4596 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.445082 kernel: audit: type=1106 audit(1719906942.409:1350): pid=4596 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.409000 audit[4596]: CRED_DISP pid=4596 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.446161 systemd[1]: sshd@13-10.128.0.108:22-147.75.109.163:38014.service: Deactivated successfully. Jul 2 07:55:42.447395 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:55:42.450228 systemd-logind[1224]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:55:42.452301 systemd-logind[1224]: Removed session 14. Jul 2 07:55:42.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.108:22-147.75.109.163:38014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.471930 kernel: audit: type=1104 audit(1719906942.409:1351): pid=4596 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.471331 systemd[1]: run-containerd-runc-k8s.io-b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76-runc.D6H9Gg.mount: Deactivated successfully. Jul 2 07:55:47.500402 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:55:47.500524 kernel: audit: type=1130 audit(1719906947.478:1353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.108:22-147.75.109.163:56772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:47.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.108:22-147.75.109.163:56772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:47.479023 systemd[1]: Started sshd@14-10.128.0.108:22-147.75.109.163:56772.service. Jul 2 07:55:47.811085 kernel: audit: type=1101 audit(1719906947.779:1354): pid=4619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.779000 audit[4619]: USER_ACCT pid=4619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.811390 sshd[4619]: Accepted publickey for core from 147.75.109.163 port 56772 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:47.811750 sshd[4619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:47.810000 audit[4619]: CRED_ACQ pid=4619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.822512 systemd[1]: Started session-15.scope. Jul 2 07:55:47.824453 systemd-logind[1224]: New session 15 of user core. Jul 2 07:55:47.841020 kernel: audit: type=1103 audit(1719906947.810:1355): pid=4619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.841531 kernel: audit: type=1006 audit(1719906947.810:1356): pid=4619 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 2 07:55:47.810000 audit[4619]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf6fc1520 a2=3 a3=0 items=0 ppid=1 pid=4619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:47.885977 kernel: audit: type=1300 audit(1719906947.810:1356): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf6fc1520 a2=3 a3=0 items=0 ppid=1 pid=4619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:47.886130 kernel: audit: type=1327 audit(1719906947.810:1356): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:47.810000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:47.895963 kernel: audit: type=1105 audit(1719906947.832:1357): pid=4619 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.832000 audit[4619]: USER_START pid=4619 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.838000 audit[4637]: CRED_ACQ pid=4637 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.952756 kernel: audit: type=1103 audit(1719906947.838:1358): pid=4637 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.101018 sshd[4619]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:48.103000 audit[4619]: USER_END pid=4619 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.107197 systemd[1]: sshd@14-10.128.0.108:22-147.75.109.163:56772.service: Deactivated successfully. Jul 2 07:55:48.108390 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:55:48.111198 systemd-logind[1224]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:55:48.112958 systemd-logind[1224]: Removed session 15. Jul 2 07:55:48.103000 audit[4619]: CRED_DISP pid=4619 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.155078 systemd[1]: Started sshd@15-10.128.0.108:22-147.75.109.163:56774.service. Jul 2 07:55:48.161291 kernel: audit: type=1106 audit(1719906948.103:1359): pid=4619 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.161435 kernel: audit: type=1104 audit(1719906948.103:1360): pid=4619 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.108:22-147.75.109.163:56772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:48.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.108:22-147.75.109.163:56774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:48.454000 audit[4647]: USER_ACCT pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.456720 sshd[4647]: Accepted publickey for core from 147.75.109.163 port 56774 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:48.456000 audit[4647]: CRED_ACQ pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.456000 audit[4647]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21696c70 a2=3 a3=0 items=0 ppid=1 pid=4647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:48.456000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:48.458005 sshd[4647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:48.465337 systemd-logind[1224]: New session 16 of user core. Jul 2 07:55:48.466235 systemd[1]: Started session-16.scope. Jul 2 07:55:48.477000 audit[4647]: USER_START pid=4647 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.479000 audit[4649]: CRED_ACQ pid=4649 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.824928 sshd[4647]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:48.826000 audit[4647]: USER_END pid=4647 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.826000 audit[4647]: CRED_DISP pid=4647 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:48.829921 systemd[1]: sshd@15-10.128.0.108:22-147.75.109.163:56774.service: Deactivated successfully. Jul 2 07:55:48.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.108:22-147.75.109.163:56774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:48.831308 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 07:55:48.832655 systemd-logind[1224]: Session 16 logged out. Waiting for processes to exit. Jul 2 07:55:48.834064 systemd-logind[1224]: Removed session 16. Jul 2 07:55:48.870674 systemd[1]: Started sshd@16-10.128.0.108:22-147.75.109.163:56782.service. Jul 2 07:55:48.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.108:22-147.75.109.163:56782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:49.159000 audit[4656]: USER_ACCT pid=4656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.160996 sshd[4656]: Accepted publickey for core from 147.75.109.163 port 56782 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:49.162000 audit[4656]: CRED_ACQ pid=4656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.162000 audit[4656]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff33560840 a2=3 a3=0 items=0 ppid=1 pid=4656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:49.162000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:49.163814 sshd[4656]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:49.170988 systemd-logind[1224]: New session 17 of user core. Jul 2 07:55:49.171462 systemd[1]: Started session-17.scope. Jul 2 07:55:49.180000 audit[4656]: USER_START pid=4656 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:49.182000 audit[4658]: CRED_ACQ pid=4658 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:50.452000 audit[4668]: NETFILTER_CFG table=filter:123 family=2 entries=22 op=nft_register_rule pid=4668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.452000 audit[4668]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffcdf599ab0 a2=0 a3=7ffcdf599a9c items=0 ppid=2324 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.455000 audit[4668]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.455000 audit[4668]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcdf599ab0 a2=0 a3=0 items=0 ppid=2324 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.473000 audit[4670]: NETFILTER_CFG table=filter:125 family=2 entries=34 op=nft_register_rule pid=4670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.473000 audit[4670]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffd92c17de0 a2=0 a3=7ffd92c17dcc items=0 ppid=2324 pid=4670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.475000 audit[4670]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:50.475000 audit[4670]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd92c17de0 a2=0 a3=0 items=0 ppid=2324 pid=4670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.475000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:50.496604 sshd[4656]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:50.497000 audit[4656]: USER_END pid=4656 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:50.497000 audit[4656]: CRED_DISP pid=4656 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:50.501950 systemd-logind[1224]: Session 17 logged out. Waiting for processes to exit. Jul 2 07:55:50.504274 systemd[1]: sshd@16-10.128.0.108:22-147.75.109.163:56782.service: Deactivated successfully. Jul 2 07:55:50.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.108:22-147.75.109.163:56782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:50.505557 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 07:55:50.507717 systemd-logind[1224]: Removed session 17. Jul 2 07:55:50.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.108:22-147.75.109.163:56786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:50.542291 systemd[1]: Started sshd@17-10.128.0.108:22-147.75.109.163:56786.service. Jul 2 07:55:50.833000 audit[4673]: USER_ACCT pid=4673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:50.834639 sshd[4673]: Accepted publickey for core from 147.75.109.163 port 56786 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:50.835000 audit[4673]: CRED_ACQ pid=4673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:50.835000 audit[4673]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc599639b0 a2=3 a3=0 items=0 ppid=1 pid=4673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:50.835000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:50.837058 sshd[4673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:50.844275 systemd[1]: Started session-18.scope. Jul 2 07:55:50.845621 systemd-logind[1224]: New session 18 of user core. Jul 2 07:55:50.853000 audit[4673]: USER_START pid=4673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:50.856000 audit[4675]: CRED_ACQ pid=4675 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:51.404158 sshd[4673]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:51.405000 audit[4673]: USER_END pid=4673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:51.405000 audit[4673]: CRED_DISP pid=4673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:51.408777 systemd[1]: sshd@17-10.128.0.108:22-147.75.109.163:56786.service: Deactivated successfully. Jul 2 07:55:51.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.108:22-147.75.109.163:56786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:51.410094 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 07:55:51.411197 systemd-logind[1224]: Session 18 logged out. Waiting for processes to exit. Jul 2 07:55:51.412814 systemd-logind[1224]: Removed session 18. Jul 2 07:55:51.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.108:22-147.75.109.163:56792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:51.451092 systemd[1]: Started sshd@18-10.128.0.108:22-147.75.109.163:56792.service. Jul 2 07:55:51.742000 audit[4682]: USER_ACCT pid=4682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:51.744988 sshd[4682]: Accepted publickey for core from 147.75.109.163 port 56792 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:51.744000 audit[4682]: CRED_ACQ pid=4682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:51.744000 audit[4682]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7bf13a80 a2=3 a3=0 items=0 ppid=1 pid=4682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:51.744000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:51.746347 sshd[4682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:51.754216 systemd[1]: Started session-19.scope. Jul 2 07:55:51.754920 systemd-logind[1224]: New session 19 of user core. Jul 2 07:55:51.762000 audit[4682]: USER_START pid=4682 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:51.764000 audit[4684]: CRED_ACQ pid=4684 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:52.028319 sshd[4682]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:52.029000 audit[4682]: USER_END pid=4682 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:52.029000 audit[4682]: CRED_DISP pid=4682 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:52.033387 systemd[1]: sshd@18-10.128.0.108:22-147.75.109.163:56792.service: Deactivated successfully. Jul 2 07:55:52.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.108:22-147.75.109.163:56792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:52.034671 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 07:55:52.035719 systemd-logind[1224]: Session 19 logged out. Waiting for processes to exit. Jul 2 07:55:52.037052 systemd-logind[1224]: Removed session 19. Jul 2 07:55:57.075387 systemd[1]: Started sshd@19-10.128.0.108:22-147.75.109.163:47614.service. Jul 2 07:55:57.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.108:22-147.75.109.163:47614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:57.107427 kernel: kauditd_printk_skb: 57 callbacks suppressed Jul 2 07:55:57.107528 kernel: audit: type=1130 audit(1719906957.075:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.108:22-147.75.109.163:47614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:57.367000 audit[4695]: USER_ACCT pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.398714 sshd[4695]: Accepted publickey for core from 147.75.109.163 port 47614 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:57.399247 kernel: audit: type=1101 audit(1719906957.367:1403): pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.398000 audit[4695]: CRED_ACQ pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.401357 sshd[4695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:57.410090 systemd[1]: Started session-20.scope. Jul 2 07:55:57.412264 systemd-logind[1224]: New session 20 of user core. Jul 2 07:55:57.427312 kernel: audit: type=1103 audit(1719906957.398:1404): pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.427438 kernel: audit: type=1006 audit(1719906957.398:1405): pid=4695 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Jul 2 07:55:57.398000 audit[4695]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1d47e030 a2=3 a3=0 items=0 ppid=1 pid=4695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:57.442920 kernel: audit: type=1300 audit(1719906957.398:1405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1d47e030 a2=3 a3=0 items=0 ppid=1 pid=4695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:57.471023 kernel: audit: type=1327 audit(1719906957.398:1405): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:57.398000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:57.421000 audit[4695]: USER_START pid=4695 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.512984 kernel: audit: type=1105 audit(1719906957.421:1406): pid=4695 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.424000 audit[4697]: CRED_ACQ pid=4697 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.537724 kernel: audit: type=1103 audit(1719906957.424:1407): pid=4697 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.716860 sshd[4695]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:57.718000 audit[4695]: USER_END pid=4695 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.722707 systemd[1]: sshd@19-10.128.0.108:22-147.75.109.163:47614.service: Deactivated successfully. Jul 2 07:55:57.723952 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 07:55:57.726327 systemd-logind[1224]: Session 20 logged out. Waiting for processes to exit. Jul 2 07:55:57.727900 systemd-logind[1224]: Removed session 20. Jul 2 07:55:57.718000 audit[4695]: CRED_DISP pid=4695 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.776810 kernel: audit: type=1106 audit(1719906957.718:1408): pid=4695 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.777191 kernel: audit: type=1104 audit(1719906957.718:1409): pid=4695 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:57.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.108:22-147.75.109.163:47614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:58.637000 audit[4712]: NETFILTER_CFG table=filter:127 family=2 entries=22 op=nft_register_rule pid=4712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:58.637000 audit[4712]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdfe46bc00 a2=0 a3=7ffdfe46bbec items=0 ppid=2324 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:58.640000 audit[4712]: NETFILTER_CFG table=nat:128 family=2 entries=104 op=nft_register_chain pid=4712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:58.640000 audit[4712]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffdfe46bc00 a2=0 a3=7ffdfe46bbec items=0 ppid=2324 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:58.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:02.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.108:22-147.75.109.163:41426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.766599 systemd[1]: Started sshd@20-10.128.0.108:22-147.75.109.163:41426.service. Jul 2 07:56:02.773158 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 07:56:02.773282 kernel: audit: type=1130 audit(1719906962.766:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.108:22-147.75.109.163:41426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:03.063000 audit[4717]: USER_ACCT pid=4717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.095074 kernel: audit: type=1101 audit(1719906963.063:1414): pid=4717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.095135 sshd[4717]: Accepted publickey for core from 147.75.109.163 port 41426 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:03.095859 sshd[4717]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:03.094000 audit[4717]: CRED_ACQ pid=4717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.103724 systemd[1]: Started session-21.scope. Jul 2 07:56:03.104969 systemd-logind[1224]: New session 21 of user core. Jul 2 07:56:03.122910 kernel: audit: type=1103 audit(1719906963.094:1415): pid=4717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.123057 kernel: audit: type=1006 audit(1719906963.094:1416): pid=4717 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jul 2 07:56:03.094000 audit[4717]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4ba15f90 a2=3 a3=0 items=0 ppid=1 pid=4717 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:03.167177 kernel: audit: type=1300 audit(1719906963.094:1416): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4ba15f90 a2=3 a3=0 items=0 ppid=1 pid=4717 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:03.167353 kernel: audit: type=1327 audit(1719906963.094:1416): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:03.094000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:03.112000 audit[4717]: USER_START pid=4717 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.208998 kernel: audit: type=1105 audit(1719906963.112:1417): pid=4717 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.123000 audit[4719]: CRED_ACQ pid=4719 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.233620 kernel: audit: type=1103 audit(1719906963.123:1418): pid=4719 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.376063 sshd[4717]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:03.377000 audit[4717]: USER_END pid=4717 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.381828 systemd-logind[1224]: Session 21 logged out. Waiting for processes to exit. Jul 2 07:56:03.384255 systemd[1]: sshd@20-10.128.0.108:22-147.75.109.163:41426.service: Deactivated successfully. Jul 2 07:56:03.385423 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 07:56:03.387717 systemd-logind[1224]: Removed session 21. Jul 2 07:56:03.377000 audit[4717]: CRED_DISP pid=4717 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.435446 kernel: audit: type=1106 audit(1719906963.377:1419): pid=4717 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.435631 kernel: audit: type=1104 audit(1719906963.377:1420): pid=4717 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:03.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.108:22-147.75.109.163:41426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.004081 systemd[1]: run-containerd-runc-k8s.io-3309279b89ac458728090d82ca2b17a63e232232226029a402765b18fe66b26e-runc.Y7zIT6.mount: Deactivated successfully. Jul 2 07:56:08.424928 systemd[1]: Started sshd@21-10.128.0.108:22-147.75.109.163:41428.service. Jul 2 07:56:08.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.108:22-147.75.109.163:41428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.434909 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:56:08.435027 kernel: audit: type=1130 audit(1719906968.427:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.108:22-147.75.109.163:41428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.645904 kubelet[2153]: I0702 07:56:08.644397 2153 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:56:08.722000 audit[4749]: USER_ACCT pid=4749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:08.754921 kernel: audit: type=1101 audit(1719906968.722:1423): pid=4749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:08.755243 sshd[4749]: Accepted publickey for core from 147.75.109.163 port 41428 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:08.756459 sshd[4749]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:08.765271 systemd-logind[1224]: New session 22 of user core. Jul 2 07:56:08.766321 systemd[1]: Started session-22.scope. Jul 2 07:56:08.754000 audit[4749]: CRED_ACQ pid=4749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:08.824900 kernel: audit: type=1103 audit(1719906968.754:1424): pid=4749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:08.825077 kernel: audit: type=1006 audit(1719906968.754:1425): pid=4749 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 07:56:08.825141 kernel: audit: type=1300 audit(1719906968.754:1425): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd1b88020 a2=3 a3=0 items=0 ppid=1 pid=4749 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:08.754000 audit[4749]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd1b88020 a2=3 a3=0 items=0 ppid=1 pid=4749 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:08.754000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:08.862929 kernel: audit: type=1327 audit(1719906968.754:1425): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:08.863122 kernel: audit: type=1105 audit(1719906968.776:1426): pid=4749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:08.776000 audit[4749]: USER_START pid=4749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:08.779000 audit[4756]: CRED_ACQ pid=4756 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:08.919949 kernel: audit: type=1103 audit(1719906968.779:1427): pid=4756 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:08.936592 kernel: audit: type=1325 audit(1719906968.793:1428): table=filter:129 family=2 entries=9 op=nft_register_rule pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:08.793000 audit[4757]: NETFILTER_CFG table=filter:129 family=2 entries=9 op=nft_register_rule pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:08.793000 audit[4757]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe4ed7c3a0 a2=0 a3=7ffe4ed7c38c items=0 ppid=2324 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:08.973925 kernel: audit: type=1300 audit(1719906968.793:1428): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe4ed7c3a0 a2=0 a3=7ffe4ed7c38c items=0 ppid=2324 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:08.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:08.798000 audit[4757]: NETFILTER_CFG table=nat:130 family=2 entries=51 op=nft_register_chain pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:08.798000 audit[4757]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffe4ed7c3a0 a2=0 a3=7ffe4ed7c38c items=0 ppid=2324 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:08.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:09.102256 sshd[4749]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:09.104000 audit[4749]: USER_END pid=4749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:09.104000 audit[4749]: CRED_DISP pid=4749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:09.109538 systemd-logind[1224]: Session 22 logged out. Waiting for processes to exit. Jul 2 07:56:09.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.108:22-147.75.109.163:41428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:09.111241 systemd[1]: sshd@21-10.128.0.108:22-147.75.109.163:41428.service: Deactivated successfully. Jul 2 07:56:09.112785 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 07:56:09.115505 systemd-logind[1224]: Removed session 22. Jul 2 07:56:11.203808 kubelet[2153]: I0702 07:56:11.203749 2153 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:56:11.268000 audit[4770]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=4770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:11.268000 audit[4770]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffef0dcf820 a2=0 a3=7ffef0dcf80c items=0 ppid=2324 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:11.268000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:11.272000 audit[4770]: NETFILTER_CFG table=nat:132 family=2 entries=58 op=nft_register_chain pid=4770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:11.272000 audit[4770]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffef0dcf820 a2=0 a3=7ffef0dcf80c items=0 ppid=2324 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:11.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:12.820000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:12.820000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c007e482d0 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:56:12.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:56:12.836000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:12.836000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c006fd2900 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:56:12.836000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:56:12.836000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:12.836000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0082bef80 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:56:12.836000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:56:12.845000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:12.845000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c006fd2f30 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:56:12.845000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:56:13.022000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:13.022000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c007873500 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:56:13.022000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:56:13.023000 audit[2032]: AVC avc: denied { watch } for pid=2032 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:13.023000 audit[2032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c007904860 a2=fc6 a3=0 items=0 ppid=1871 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c407 key=(null) Jul 2 07:56:13.023000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 07:56:13.198000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:13.198000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028f0270 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:56:13.198000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:13.198000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:13.198000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288cc00 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:56:13.198000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:14.151749 systemd[1]: Started sshd@22-10.128.0.108:22-147.75.109.163:51880.service. Jul 2 07:56:14.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.108:22-147.75.109.163:51880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.183735 kernel: kauditd_printk_skb: 37 callbacks suppressed Jul 2 07:56:14.183923 kernel: audit: type=1130 audit(1719906974.152:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.108:22-147.75.109.163:51880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.445000 audit[4772]: USER_ACCT pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.476258 sshd[4772]: Accepted publickey for core from 147.75.109.163 port 51880 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:14.477123 kernel: audit: type=1101 audit(1719906974.445:1444): pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.477535 sshd[4772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:14.486248 systemd[1]: Started session-23.scope. Jul 2 07:56:14.488759 systemd-logind[1224]: New session 23 of user core. Jul 2 07:56:14.475000 audit[4772]: CRED_ACQ pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.524906 kernel: audit: type=1103 audit(1719906974.475:1445): pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.547924 kernel: audit: type=1006 audit(1719906974.475:1446): pid=4772 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 07:56:14.548091 kernel: audit: type=1300 audit(1719906974.475:1446): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5b63b3b0 a2=3 a3=0 items=0 ppid=1 pid=4772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:14.475000 audit[4772]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5b63b3b0 a2=3 a3=0 items=0 ppid=1 pid=4772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:14.475000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:14.585638 kernel: audit: type=1327 audit(1719906974.475:1446): proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:14.500000 audit[4772]: USER_START pid=4772 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.618332 kernel: audit: type=1105 audit(1719906974.500:1447): pid=4772 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.503000 audit[4774]: CRED_ACQ pid=4774 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.644988 kernel: audit: type=1103 audit(1719906974.503:1448): pid=4774 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.781113 sshd[4772]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:14.782000 audit[4772]: USER_END pid=4772 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.785792 systemd[1]: sshd@22-10.128.0.108:22-147.75.109.163:51880.service: Deactivated successfully. Jul 2 07:56:14.787090 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 07:56:14.789342 systemd-logind[1224]: Session 23 logged out. Waiting for processes to exit. Jul 2 07:56:14.790816 systemd-logind[1224]: Removed session 23. Jul 2 07:56:14.782000 audit[4772]: CRED_DISP pid=4772 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.840713 kernel: audit: type=1106 audit(1719906974.782:1449): pid=4772 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.840917 kernel: audit: type=1104 audit(1719906974.782:1450): pid=4772 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:14.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.108:22-147.75.109.163:51880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.728000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:15.728000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288ce00 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:56:15.728000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:15.731000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:15.731000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a52a00 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:56:15.731000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:15.783000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:15.783000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a52a20 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:56:15.783000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:15.786000 audit[2020]: AVC avc: denied { watch } for pid=2020 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:56:15.786000 audit[2020]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288d2c0 a2=fc6 a3=0 items=0 ppid=1874 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c887 key=(null) Jul 2 07:56:15.786000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:56:17.478941 systemd[1]: run-containerd-runc-k8s.io-b30404501796b3715a275d15fc26fc71d9c70471e42a9643b6bf76172d87ca76-runc.IAy5mX.mount: Deactivated successfully. Jul 2 07:56:18.006000 audit[4153]: AVC avc: denied { watch } for pid=4153 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_55_12.1529087974/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c269,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c269,c992 tclass=file permissive=0 Jul 2 07:56:18.006000 audit[4153]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ded2c0 a2=fc6 a3=0 items=0 ppid=4039 pid=4153 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c269,c992 key=(null) Jul 2 07:56:18.006000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274