Jul 2 07:52:51.083887 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:52:51.083927 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:52:51.083946 kernel: BIOS-provided physical RAM map: Jul 2 07:52:51.083959 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Jul 2 07:52:51.083972 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Jul 2 07:52:51.083986 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Jul 2 07:52:51.084006 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Jul 2 07:52:51.084021 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Jul 2 07:52:51.084034 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Jul 2 07:52:51.084046 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Jul 2 07:52:51.084059 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Jul 2 07:52:51.084076 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Jul 2 07:52:51.084089 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Jul 2 07:52:51.084104 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Jul 2 07:52:51.084125 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Jul 2 07:52:51.084141 kernel: NX (Execute Disable) protection: active Jul 2 07:52:51.084156 kernel: efi: EFI v2.70 by EDK II Jul 2 07:52:51.084171 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd2d2018 Jul 2 07:52:51.084187 kernel: random: crng init done Jul 2 07:52:51.084202 kernel: SMBIOS 2.4 present. Jul 2 07:52:51.084217 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Jul 2 07:52:51.084232 kernel: Hypervisor detected: KVM Jul 2 07:52:51.084254 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:52:51.084269 kernel: kvm-clock: cpu 0, msr 1b1192001, primary cpu clock Jul 2 07:52:51.084284 kernel: kvm-clock: using sched offset of 12680790824 cycles Jul 2 07:52:51.084300 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:52:51.084316 kernel: tsc: Detected 2299.998 MHz processor Jul 2 07:52:51.084332 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:52:51.084348 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:52:51.084363 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Jul 2 07:52:51.084379 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:52:51.084394 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Jul 2 07:52:51.084412 kernel: Using GB pages for direct mapping Jul 2 07:52:51.084451 kernel: Secure boot disabled Jul 2 07:52:51.084466 kernel: ACPI: Early table checksum verification disabled Jul 2 07:52:51.084481 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Jul 2 07:52:51.084496 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Jul 2 07:52:51.084512 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Jul 2 07:52:51.084527 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Jul 2 07:52:51.084543 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Jul 2 07:52:51.084570 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Jul 2 07:52:51.084586 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Jul 2 07:52:51.084603 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Jul 2 07:52:51.084619 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Jul 2 07:52:51.084636 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Jul 2 07:52:51.084652 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Jul 2 07:52:51.084672 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Jul 2 07:52:51.084689 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Jul 2 07:52:51.084705 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Jul 2 07:52:51.084721 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Jul 2 07:52:51.084738 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Jul 2 07:52:51.084754 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Jul 2 07:52:51.084771 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Jul 2 07:52:51.084788 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Jul 2 07:52:51.084804 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Jul 2 07:52:51.084822 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:52:51.084838 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:52:51.084855 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 2 07:52:51.084872 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Jul 2 07:52:51.084888 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Jul 2 07:52:51.084904 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Jul 2 07:52:51.084922 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Jul 2 07:52:51.084939 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Jul 2 07:52:51.084956 kernel: Zone ranges: Jul 2 07:52:51.084980 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:52:51.084996 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 07:52:51.085013 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Jul 2 07:52:51.085029 kernel: Movable zone start for each node Jul 2 07:52:51.085046 kernel: Early memory node ranges Jul 2 07:52:51.085062 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Jul 2 07:52:51.085080 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Jul 2 07:52:51.085096 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Jul 2 07:52:51.085113 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Jul 2 07:52:51.085132 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Jul 2 07:52:51.085148 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Jul 2 07:52:51.085162 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:52:51.085179 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Jul 2 07:52:51.085195 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Jul 2 07:52:51.085211 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Jul 2 07:52:51.085228 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Jul 2 07:52:51.085245 kernel: ACPI: PM-Timer IO Port: 0xb008 Jul 2 07:52:51.085262 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:52:51.085283 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:52:51.085300 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:52:51.085316 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:52:51.085333 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:52:51.085350 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:52:51.085367 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:52:51.085383 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:52:51.085399 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Jul 2 07:52:51.085416 kernel: Booting paravirtualized kernel on KVM Jul 2 07:52:51.085457 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:52:51.085474 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:52:51.085491 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:52:51.085507 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:52:51.085523 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:52:51.085540 kernel: kvm-guest: PV spinlocks enabled Jul 2 07:52:51.085557 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:52:51.085573 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932280 Jul 2 07:52:51.085590 kernel: Policy zone: Normal Jul 2 07:52:51.085611 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:52:51.085628 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:52:51.085644 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jul 2 07:52:51.085661 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:52:51.085677 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:52:51.085694 kernel: Memory: 7516812K/7860584K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 343512K reserved, 0K cma-reserved) Jul 2 07:52:51.085710 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:52:51.085727 kernel: Kernel/User page tables isolation: enabled Jul 2 07:52:51.085748 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:52:51.085765 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:52:51.085782 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:52:51.085800 kernel: rcu: RCU event tracing is enabled. Jul 2 07:52:51.085817 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:52:51.085833 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:52:51.085850 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:52:51.085866 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:52:51.085883 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:52:51.085904 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 07:52:51.085934 kernel: Console: colour dummy device 80x25 Jul 2 07:52:51.085951 kernel: printk: console [ttyS0] enabled Jul 2 07:52:51.085972 kernel: ACPI: Core revision 20210730 Jul 2 07:52:51.085990 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:52:51.086007 kernel: x2apic enabled Jul 2 07:52:51.086025 kernel: Switched APIC routing to physical x2apic. Jul 2 07:52:51.086042 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Jul 2 07:52:51.086061 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Jul 2 07:52:51.086079 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Jul 2 07:52:51.086101 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Jul 2 07:52:51.086119 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Jul 2 07:52:51.086136 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:52:51.086154 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 2 07:52:51.086172 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 2 07:52:51.086190 kernel: Spectre V2 : Mitigation: IBRS Jul 2 07:52:51.086211 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:52:51.086229 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:52:51.086247 kernel: RETBleed: Mitigation: IBRS Jul 2 07:52:51.086265 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:52:51.086283 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Jul 2 07:52:51.086301 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 07:52:51.086318 kernel: MDS: Mitigation: Clear CPU buffers Jul 2 07:52:51.086336 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:52:51.086354 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:52:51.086375 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:52:51.086393 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:52:51.086411 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:52:51.086465 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 07:52:51.086482 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:52:51.086499 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:52:51.086516 kernel: LSM: Security Framework initializing Jul 2 07:52:51.086532 kernel: SELinux: Initializing. Jul 2 07:52:51.086550 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:52:51.086573 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:52:51.086590 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Jul 2 07:52:51.086608 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Jul 2 07:52:51.086625 kernel: signal: max sigframe size: 1776 Jul 2 07:52:51.086642 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:52:51.086660 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:52:51.086677 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:52:51.086695 kernel: x86: Booting SMP configuration: Jul 2 07:52:51.086712 kernel: .... node #0, CPUs: #1 Jul 2 07:52:51.086734 kernel: kvm-clock: cpu 1, msr 1b1192041, secondary cpu clock Jul 2 07:52:51.086752 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Jul 2 07:52:51.086771 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:52:51.086788 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:52:51.086806 kernel: smpboot: Max logical packages: 1 Jul 2 07:52:51.086824 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Jul 2 07:52:51.086842 kernel: devtmpfs: initialized Jul 2 07:52:51.086859 kernel: x86/mm: Memory block size: 128MB Jul 2 07:52:51.086876 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Jul 2 07:52:51.086897 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:52:51.086915 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:52:51.086933 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:52:51.086951 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:52:51.086969 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:52:51.086986 kernel: audit: type=2000 audit(1719906769.435:1): state=initialized audit_enabled=0 res=1 Jul 2 07:52:51.087003 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:52:51.087021 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:52:51.087039 kernel: cpuidle: using governor menu Jul 2 07:52:51.087060 kernel: ACPI: bus type PCI registered Jul 2 07:52:51.087079 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:52:51.087096 kernel: dca service started, version 1.12.1 Jul 2 07:52:51.087114 kernel: PCI: Using configuration type 1 for base access Jul 2 07:52:51.087132 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:52:51.087150 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:52:51.087168 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:52:51.087186 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:52:51.087203 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:52:51.087225 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:52:51.087242 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:52:51.087260 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:52:51.087278 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:52:51.087295 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:52:51.087313 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Jul 2 07:52:51.087331 kernel: ACPI: Interpreter enabled Jul 2 07:52:51.087348 kernel: ACPI: PM: (supports S0 S3 S5) Jul 2 07:52:51.087365 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:52:51.087387 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:52:51.087404 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Jul 2 07:52:51.087450 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:52:51.087689 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:52:51.087862 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 07:52:51.087886 kernel: PCI host bridge to bus 0000:00 Jul 2 07:52:51.088047 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:52:51.088201 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:52:51.088345 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:52:51.088518 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Jul 2 07:52:51.088657 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:52:51.088830 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:52:51.088998 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Jul 2 07:52:51.089179 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 07:52:51.089342 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Jul 2 07:52:51.089548 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Jul 2 07:52:51.089712 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Jul 2 07:52:51.089872 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Jul 2 07:52:51.090043 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:52:51.090211 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Jul 2 07:52:51.090408 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Jul 2 07:52:51.090616 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 07:52:51.090789 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Jul 2 07:52:51.090955 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Jul 2 07:52:51.090978 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:52:51.090996 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:52:51.091014 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:52:51.091037 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:52:51.091054 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:52:51.091072 kernel: iommu: Default domain type: Translated Jul 2 07:52:51.091089 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:52:51.091106 kernel: vgaarb: loaded Jul 2 07:52:51.091124 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:52:51.091141 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:52:51.091159 kernel: PTP clock support registered Jul 2 07:52:51.091176 kernel: Registered efivars operations Jul 2 07:52:51.091197 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:52:51.091215 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:52:51.091232 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Jul 2 07:52:51.091248 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Jul 2 07:52:51.091265 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Jul 2 07:52:51.091281 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Jul 2 07:52:51.091298 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:52:51.091316 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:52:51.091333 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:52:51.091351 kernel: pnp: PnP ACPI init Jul 2 07:52:51.091372 kernel: pnp: PnP ACPI: found 7 devices Jul 2 07:52:51.091390 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:52:51.091407 kernel: NET: Registered PF_INET protocol family Jul 2 07:52:51.091474 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:52:51.091490 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jul 2 07:52:51.091503 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:52:51.091517 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:52:51.091532 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 07:52:51.091546 kernel: TCP: Hash tables configured (established 65536 bind 65536) Jul 2 07:52:51.091567 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:52:51.091584 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:52:51.091599 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:52:51.091614 kernel: NET: Registered PF_XDP protocol family Jul 2 07:52:51.091779 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:52:51.091926 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:52:51.092077 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:52:51.092227 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Jul 2 07:52:51.092395 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:52:51.092417 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:52:51.092463 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 07:52:51.092481 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Jul 2 07:52:51.092499 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:52:51.092517 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Jul 2 07:52:51.092534 kernel: clocksource: Switched to clocksource tsc Jul 2 07:52:51.092551 kernel: Initialise system trusted keyrings Jul 2 07:52:51.092573 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Jul 2 07:52:51.092591 kernel: Key type asymmetric registered Jul 2 07:52:51.092608 kernel: Asymmetric key parser 'x509' registered Jul 2 07:52:51.092625 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:52:51.092643 kernel: io scheduler mq-deadline registered Jul 2 07:52:51.092660 kernel: io scheduler kyber registered Jul 2 07:52:51.092677 kernel: io scheduler bfq registered Jul 2 07:52:51.092694 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:52:51.092713 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 07:52:51.092893 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Jul 2 07:52:51.092917 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Jul 2 07:52:51.093081 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Jul 2 07:52:51.093103 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 07:52:51.093267 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Jul 2 07:52:51.093288 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:52:51.093307 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:52:51.093324 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 07:52:51.093346 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Jul 2 07:52:51.093364 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Jul 2 07:52:51.093566 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Jul 2 07:52:51.093591 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:52:51.093609 kernel: i8042: Warning: Keylock active Jul 2 07:52:51.093626 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:52:51.093642 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:52:51.093806 kernel: rtc_cmos 00:00: RTC can wake from S4 Jul 2 07:52:51.093964 kernel: rtc_cmos 00:00: registered as rtc0 Jul 2 07:52:51.094116 kernel: rtc_cmos 00:00: setting system clock to 2024-07-02T07:52:50 UTC (1719906770) Jul 2 07:52:51.094266 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Jul 2 07:52:51.094287 kernel: intel_pstate: CPU model not supported Jul 2 07:52:51.094306 kernel: pstore: Registered efi as persistent store backend Jul 2 07:52:51.094324 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:52:51.094341 kernel: Segment Routing with IPv6 Jul 2 07:52:51.094358 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:52:51.094380 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:52:51.094398 kernel: Key type dns_resolver registered Jul 2 07:52:51.094415 kernel: IPI shorthand broadcast: enabled Jul 2 07:52:51.102395 kernel: sched_clock: Marking stable (733488591, 142497559)->(917158328, -41172178) Jul 2 07:52:51.102460 kernel: registered taskstats version 1 Jul 2 07:52:51.102478 kernel: Loading compiled-in X.509 certificates Jul 2 07:52:51.102495 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:52:51.102512 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:52:51.102528 kernel: Key type .fscrypt registered Jul 2 07:52:51.102550 kernel: Key type fscrypt-provisioning registered Jul 2 07:52:51.102566 kernel: pstore: Using crash dump compression: deflate Jul 2 07:52:51.102582 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:52:51.102599 kernel: ima: No architecture policies found Jul 2 07:52:51.102614 kernel: clk: Disabling unused clocks Jul 2 07:52:51.102631 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:52:51.102646 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:52:51.102662 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:52:51.102677 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:52:51.102696 kernel: Run /init as init process Jul 2 07:52:51.102712 kernel: with arguments: Jul 2 07:52:51.102728 kernel: /init Jul 2 07:52:51.102743 kernel: with environment: Jul 2 07:52:51.102757 kernel: HOME=/ Jul 2 07:52:51.102772 kernel: TERM=linux Jul 2 07:52:51.102788 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:52:51.102808 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:52:51.102832 systemd[1]: Detected virtualization kvm. Jul 2 07:52:51.102849 systemd[1]: Detected architecture x86-64. Jul 2 07:52:51.102864 systemd[1]: Running in initrd. Jul 2 07:52:51.102881 systemd[1]: No hostname configured, using default hostname. Jul 2 07:52:51.102896 systemd[1]: Hostname set to . Jul 2 07:52:51.102913 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:52:51.102930 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:52:51.102946 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:52:51.102966 systemd[1]: Reached target cryptsetup.target. Jul 2 07:52:51.102982 systemd[1]: Reached target paths.target. Jul 2 07:52:51.102997 systemd[1]: Reached target slices.target. Jul 2 07:52:51.103013 systemd[1]: Reached target swap.target. Jul 2 07:52:51.103029 systemd[1]: Reached target timers.target. Jul 2 07:52:51.103046 systemd[1]: Listening on iscsid.socket. Jul 2 07:52:51.103063 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:52:51.103083 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:52:51.103100 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:52:51.103116 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:52:51.103133 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:52:51.103149 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:52:51.103166 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:52:51.103182 systemd[1]: Reached target sockets.target. Jul 2 07:52:51.103198 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:52:51.103214 systemd[1]: Finished network-cleanup.service. Jul 2 07:52:51.103234 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:52:51.103251 systemd[1]: Starting systemd-journald.service... Jul 2 07:52:51.103284 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:52:51.103304 systemd[1]: Starting systemd-resolved.service... Jul 2 07:52:51.103321 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:52:51.103338 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:52:51.103362 systemd-journald[189]: Journal started Jul 2 07:52:51.103471 systemd-journald[189]: Runtime Journal (/run/log/journal/73c009603c93382b7dfd044c1e0e519d) is 8.0M, max 148.8M, 140.8M free. Jul 2 07:52:51.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.111510 kernel: audit: type=1130 audit(1719906771.105:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.111562 systemd[1]: Started systemd-journald.service. Jul 2 07:52:51.113161 systemd-modules-load[190]: Inserted module 'overlay' Jul 2 07:52:51.120556 kernel: audit: type=1130 audit(1719906771.112:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.117167 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:52:51.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.128827 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:52:51.147723 kernel: audit: type=1130 audit(1719906771.127:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.147761 kernel: audit: type=1130 audit(1719906771.134:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.136923 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:52:51.144632 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:52:51.173456 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:52:51.181449 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:52:51.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.185452 kernel: audit: type=1130 audit(1719906771.180:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.189010 systemd-modules-load[190]: Inserted module 'br_netfilter' Jul 2 07:52:51.189486 kernel: Bridge firewalling registered Jul 2 07:52:51.192859 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:52:51.208588 kernel: audit: type=1130 audit(1719906771.195:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.194393 systemd-resolved[191]: Positive Trust Anchors: Jul 2 07:52:51.194413 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:52:51.221388 dracut-cmdline[205]: dracut-dracut-053 Jul 2 07:52:51.194515 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:52:51.235574 kernel: SCSI subsystem initialized Jul 2 07:52:51.235615 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:52:51.197900 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:52:51.249556 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:52:51.249592 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:52:51.249613 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:52:51.204922 systemd-resolved[191]: Defaulting to hostname 'linux'. Jul 2 07:52:51.206509 systemd[1]: Started systemd-resolved.service. Jul 2 07:52:51.256789 systemd-modules-load[190]: Inserted module 'dm_multipath' Jul 2 07:52:51.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.268074 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:52:51.282892 kernel: audit: type=1130 audit(1719906771.266:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.282922 kernel: audit: type=1130 audit(1719906771.273:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.274699 systemd[1]: Reached target nss-lookup.target. Jul 2 07:52:51.282633 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:52:51.296324 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:52:51.303564 kernel: audit: type=1130 audit(1719906771.296:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.327467 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:52:51.347467 kernel: iscsi: registered transport (tcp) Jul 2 07:52:51.373776 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:52:51.373863 kernel: QLogic iSCSI HBA Driver Jul 2 07:52:51.418115 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:52:51.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.420405 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:52:51.477496 kernel: raid6: avx2x4 gen() 18281 MB/s Jul 2 07:52:51.494476 kernel: raid6: avx2x4 xor() 8080 MB/s Jul 2 07:52:51.512500 kernel: raid6: avx2x2 gen() 17783 MB/s Jul 2 07:52:51.529473 kernel: raid6: avx2x2 xor() 18550 MB/s Jul 2 07:52:51.546571 kernel: raid6: avx2x1 gen() 14200 MB/s Jul 2 07:52:51.563490 kernel: raid6: avx2x1 xor() 15770 MB/s Jul 2 07:52:51.581523 kernel: raid6: sse2x4 gen() 11017 MB/s Jul 2 07:52:51.599497 kernel: raid6: sse2x4 xor() 6594 MB/s Jul 2 07:52:51.616497 kernel: raid6: sse2x2 gen() 11950 MB/s Jul 2 07:52:51.633478 kernel: raid6: sse2x2 xor() 7423 MB/s Jul 2 07:52:51.650476 kernel: raid6: sse2x1 gen() 10549 MB/s Jul 2 07:52:51.668007 kernel: raid6: sse2x1 xor() 5187 MB/s Jul 2 07:52:51.668043 kernel: raid6: using algorithm avx2x4 gen() 18281 MB/s Jul 2 07:52:51.668076 kernel: raid6: .... xor() 8080 MB/s, rmw enabled Jul 2 07:52:51.668968 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:52:51.684468 kernel: xor: automatically using best checksumming function avx Jul 2 07:52:51.790506 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:52:51.801842 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:52:51.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.801000 audit: BPF prog-id=7 op=LOAD Jul 2 07:52:51.801000 audit: BPF prog-id=8 op=LOAD Jul 2 07:52:51.804049 systemd[1]: Starting systemd-udevd.service... Jul 2 07:52:51.820300 systemd-udevd[387]: Using default interface naming scheme 'v252'. Jul 2 07:52:51.827319 systemd[1]: Started systemd-udevd.service. Jul 2 07:52:51.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.831171 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:52:51.850483 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation Jul 2 07:52:51.887608 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:52:51.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:51.888956 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:52:51.954118 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:52:51.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:52.062911 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:52:52.134674 kernel: scsi host0: Virtio SCSI HBA Jul 2 07:52:52.143810 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:52:52.157458 kernel: AES CTR mode by8 optimization enabled Jul 2 07:52:52.157535 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Jul 2 07:52:52.216101 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Jul 2 07:52:52.216508 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Jul 2 07:52:52.216757 kernel: sd 0:0:1:0: [sda] Write Protect is off Jul 2 07:52:52.217070 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Jul 2 07:52:52.217376 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 07:52:52.228013 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:52:52.228102 kernel: GPT:17805311 != 25165823 Jul 2 07:52:52.228125 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:52:52.228146 kernel: GPT:17805311 != 25165823 Jul 2 07:52:52.228738 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:52:52.230594 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:52:52.233472 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Jul 2 07:52:52.280454 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (441) Jul 2 07:52:52.282358 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:52:52.299855 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:52:52.308444 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:52:52.308621 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:52:52.320879 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:52:52.322267 systemd[1]: Starting disk-uuid.service... Jul 2 07:52:52.334735 disk-uuid[509]: Primary Header is updated. Jul 2 07:52:52.334735 disk-uuid[509]: Secondary Entries is updated. Jul 2 07:52:52.334735 disk-uuid[509]: Secondary Header is updated. Jul 2 07:52:52.347578 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:52:52.365482 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:52:52.374468 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:52:53.371931 disk-uuid[510]: The operation has completed successfully. Jul 2 07:52:53.375624 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:52:53.452303 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:52:53.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.452492 systemd[1]: Finished disk-uuid.service. Jul 2 07:52:53.465649 systemd[1]: Starting verity-setup.service... Jul 2 07:52:53.500591 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:52:53.568202 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:52:53.570640 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:52:53.596134 systemd[1]: Finished verity-setup.service. Jul 2 07:52:53.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.673475 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:52:53.673667 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:52:53.674036 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:52:53.733623 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:52:53.733666 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:52:53.733690 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:52:53.733712 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:52:53.674975 systemd[1]: Starting ignition-setup.service... Jul 2 07:52:53.687723 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:52:53.749498 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:52:53.767834 systemd[1]: Finished ignition-setup.service. Jul 2 07:52:53.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.769139 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:52:53.807962 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:52:53.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.808000 audit: BPF prog-id=9 op=LOAD Jul 2 07:52:53.810302 systemd[1]: Starting systemd-networkd.service... Jul 2 07:52:53.842808 systemd-networkd[684]: lo: Link UP Jul 2 07:52:53.842821 systemd-networkd[684]: lo: Gained carrier Jul 2 07:52:53.843667 systemd-networkd[684]: Enumeration completed Jul 2 07:52:53.844046 systemd-networkd[684]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:52:53.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.844256 systemd[1]: Started systemd-networkd.service. Jul 2 07:52:53.846533 systemd-networkd[684]: eth0: Link UP Jul 2 07:52:53.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.846554 systemd-networkd[684]: eth0: Gained carrier Jul 2 07:52:53.856639 systemd-networkd[684]: eth0: DHCPv4 address 10.128.0.53/32, gateway 10.128.0.1 acquired from 169.254.169.254 Jul 2 07:52:53.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.959807 iscsid[694]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:52:53.959807 iscsid[694]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:52:53.959807 iscsid[694]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:52:53.959807 iscsid[694]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:52:53.959807 iscsid[694]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:52:53.959807 iscsid[694]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:52:53.959807 iscsid[694]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:52:53.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:53.873745 systemd[1]: Reached target network.target. Jul 2 07:52:54.054666 ignition[646]: Ignition 2.14.0 Jul 2 07:52:53.894873 systemd[1]: Starting iscsiuio.service... Jul 2 07:52:54.054680 ignition[646]: Stage: fetch-offline Jul 2 07:52:53.904398 systemd[1]: Started iscsiuio.service. Jul 2 07:52:54.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.054759 ignition[646]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:52:53.917814 systemd[1]: Starting iscsid.service... Jul 2 07:52:54.054804 ignition[646]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:52:53.931713 systemd[1]: Started iscsid.service. Jul 2 07:52:54.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.075982 ignition[646]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:52:53.948033 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:52:54.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.076188 ignition[646]: parsed url from cmdline: "" Jul 2 07:52:53.966903 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:52:54.076195 ignition[646]: no config URL provided Jul 2 07:52:53.986715 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:52:54.076205 ignition[646]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:52:53.995590 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:52:54.076216 ignition[646]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:52:53.995717 systemd[1]: Reached target remote-fs.target. Jul 2 07:52:54.076226 ignition[646]: failed to fetch config: resource requires networking Jul 2 07:52:53.996859 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:52:54.076619 ignition[646]: Ignition finished successfully Jul 2 07:52:54.056024 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:52:54.110888 ignition[709]: Ignition 2.14.0 Jul 2 07:52:54.080045 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:52:54.110897 ignition[709]: Stage: fetch Jul 2 07:52:54.099243 systemd[1]: Starting ignition-fetch.service... Jul 2 07:52:54.111023 ignition[709]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:52:54.130147 unknown[709]: fetched base config from "system" Jul 2 07:52:54.111053 ignition[709]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:52:54.130170 unknown[709]: fetched base config from "system" Jul 2 07:52:54.117952 ignition[709]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:52:54.130187 unknown[709]: fetched user config from "gcp" Jul 2 07:52:54.118143 ignition[709]: parsed url from cmdline: "" Jul 2 07:52:54.143928 systemd[1]: Finished ignition-fetch.service. Jul 2 07:52:54.118152 ignition[709]: no config URL provided Jul 2 07:52:54.159748 systemd[1]: Starting ignition-kargs.service... Jul 2 07:52:54.118159 ignition[709]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:52:54.182675 systemd[1]: Finished ignition-kargs.service. Jul 2 07:52:54.118169 ignition[709]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:52:54.196861 systemd[1]: Starting ignition-disks.service... Jul 2 07:52:54.118203 ignition[709]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Jul 2 07:52:54.218257 systemd[1]: Finished ignition-disks.service. Jul 2 07:52:54.125709 ignition[709]: GET result: OK Jul 2 07:52:54.220874 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:52:54.125856 ignition[709]: parsing config with SHA512: f906382ab318fa9ecacead9ef16136eda12096b575f707d0233895b03b0ea9d7e6989a2a5f98f80258e299edebff03fe1c7388a6e7d88611215b025fba35e278 Jul 2 07:52:54.242686 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:52:54.132230 ignition[709]: fetch: fetch complete Jul 2 07:52:54.257687 systemd[1]: Reached target local-fs.target. Jul 2 07:52:54.132240 ignition[709]: fetch: fetch passed Jul 2 07:52:54.264739 systemd[1]: Reached target sysinit.target. Jul 2 07:52:54.132724 ignition[709]: Ignition finished successfully Jul 2 07:52:54.286710 systemd[1]: Reached target basic.target. Jul 2 07:52:54.172247 ignition[715]: Ignition 2.14.0 Jul 2 07:52:54.297965 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:52:54.172257 ignition[715]: Stage: kargs Jul 2 07:52:54.172378 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:52:54.172415 ignition[715]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:52:54.180265 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:52:54.181584 ignition[715]: kargs: kargs passed Jul 2 07:52:54.181632 ignition[715]: Ignition finished successfully Jul 2 07:52:54.208180 ignition[721]: Ignition 2.14.0 Jul 2 07:52:54.208189 ignition[721]: Stage: disks Jul 2 07:52:54.208314 ignition[721]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:52:54.208352 ignition[721]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:52:54.215672 ignition[721]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:52:54.217179 ignition[721]: disks: disks passed Jul 2 07:52:54.217232 ignition[721]: Ignition finished successfully Jul 2 07:52:54.344195 systemd-fsck[729]: ROOT: clean, 614/1628000 files, 124057/1617920 blocks Jul 2 07:52:54.590385 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:52:54.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.599785 systemd[1]: Mounting sysroot.mount... Jul 2 07:52:54.629602 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:52:54.627165 systemd[1]: Mounted sysroot.mount. Jul 2 07:52:54.636859 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:52:54.655122 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:52:54.668178 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 07:52:54.668236 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:52:54.668287 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:52:54.758594 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (735) Jul 2 07:52:54.758638 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:52:54.758663 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:52:54.758686 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:52:54.683923 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:52:54.773740 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:52:54.707964 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:52:54.789747 initrd-setup-root[756]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:52:54.751781 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:52:54.815589 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:52:54.783362 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:52:54.835621 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:52:54.845593 initrd-setup-root[782]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:52:54.848984 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:52:54.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.856853 systemd[1]: Starting ignition-mount.service... Jul 2 07:52:54.877709 systemd[1]: Starting sysroot-boot.service... Jul 2 07:52:54.891873 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:52:54.892023 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:52:54.918577 ignition[801]: INFO : Ignition 2.14.0 Jul 2 07:52:54.918577 ignition[801]: INFO : Stage: mount Jul 2 07:52:54.918577 ignition[801]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:52:54.918577 ignition[801]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:52:55.008590 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (810) Jul 2 07:52:55.008633 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:52:55.008667 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:52:55.008688 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:52:54.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:54.923142 systemd[1]: Finished sysroot-boot.service. Jul 2 07:52:55.028694 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:52:55.028726 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:52:55.028726 ignition[801]: INFO : mount: mount passed Jul 2 07:52:55.028726 ignition[801]: INFO : Ignition finished successfully Jul 2 07:52:54.927391 systemd[1]: Finished ignition-mount.service. Jul 2 07:52:54.946772 systemd[1]: Starting ignition-files.service... Jul 2 07:52:54.960584 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:52:55.096282 ignition[829]: INFO : Ignition 2.14.0 Jul 2 07:52:55.096282 ignition[829]: INFO : Stage: files Jul 2 07:52:55.096282 ignition[829]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:52:55.096282 ignition[829]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:52:55.096282 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:52:55.096282 ignition[829]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:52:55.096282 ignition[829]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:52:55.096282 ignition[829]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:52:55.096282 ignition[829]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:52:55.096282 ignition[829]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:52:55.096282 ignition[829]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:52:55.096282 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Jul 2 07:52:55.096282 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:52:55.096282 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2630070238" Jul 2 07:52:55.096282 ignition[829]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2630070238": device or resource busy Jul 2 07:52:55.096282 ignition[829]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2630070238", trying btrfs: device or resource busy Jul 2 07:52:55.096282 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2630070238" Jul 2 07:52:55.096282 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2630070238" Jul 2 07:52:55.344599 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (832) Jul 2 07:52:55.024507 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:52:55.352597 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem2630070238" Jul 2 07:52:55.352597 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem2630070238" Jul 2 07:52:55.352597 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Jul 2 07:52:55.352597 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:52:55.352597 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 07:52:55.076520 unknown[829]: wrote ssh authorized keys file for user: core Jul 2 07:52:55.462716 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Jul 2 07:52:55.489633 systemd-networkd[684]: eth0: Gained IPv6LL Jul 2 07:52:55.593787 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4176108483" Jul 2 07:52:55.611813 ignition[829]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4176108483": device or resource busy Jul 2 07:52:55.611813 ignition[829]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4176108483", trying btrfs: device or resource busy Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4176108483" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4176108483" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem4176108483" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem4176108483" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:52:55.611813 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem414238812" Jul 2 07:52:55.855606 ignition[829]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem414238812": device or resource busy Jul 2 07:52:55.855606 ignition[829]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem414238812", trying btrfs: device or resource busy Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem414238812" Jul 2 07:52:55.855606 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem414238812" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem414238812" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem414238812" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4183021947" Jul 2 07:52:56.099633 ignition[829]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4183021947": device or resource busy Jul 2 07:52:56.099633 ignition[829]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4183021947", trying btrfs: device or resource busy Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4183021947" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4183021947" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem4183021947" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem4183021947" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Jul 2 07:52:56.099633 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:52:56.344642 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Jul 2 07:52:56.344642 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Jul 2 07:52:56.375583 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1c): [started] processing unit "oem-gce.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(20): [started] setting preset to enabled for "oem-gce.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(20): [finished] setting preset to enabled for "oem-gce.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(23): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:52:56.375583 ignition[829]: INFO : files: op(23): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:52:56.375583 ignition[829]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:52:56.922660 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 07:52:56.922709 kernel: audit: type=1130 audit(1719906776.374:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.922733 kernel: audit: type=1130 audit(1719906776.464:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.922757 kernel: audit: type=1130 audit(1719906776.521:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.922775 kernel: audit: type=1131 audit(1719906776.521:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.922790 kernel: audit: type=1130 audit(1719906776.621:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.922805 kernel: audit: type=1131 audit(1719906776.642:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.922825 kernel: audit: type=1130 audit(1719906776.750:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.922840 kernel: audit: type=1131 audit(1719906776.886:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.368116 systemd[1]: Finished ignition-files.service. Jul 2 07:52:56.936652 ignition[829]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:52:56.936652 ignition[829]: INFO : files: files passed Jul 2 07:52:56.936652 ignition[829]: INFO : Ignition finished successfully Jul 2 07:52:56.384748 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:52:56.432642 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:52:57.020641 initrd-setup-root-after-ignition[852]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:52:56.433828 systemd[1]: Starting ignition-quench.service... Jul 2 07:52:56.453029 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:52:56.466209 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:52:56.466347 systemd[1]: Finished ignition-quench.service. Jul 2 07:52:56.522946 systemd[1]: Reached target ignition-complete.target. Jul 2 07:52:56.585711 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:52:57.157670 kernel: audit: type=1131 audit(1719906777.128:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.610827 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:52:56.610957 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:52:57.207669 kernel: audit: type=1131 audit(1719906777.172:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.644304 systemd[1]: Reached target initrd-fs.target. Jul 2 07:52:57.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.687653 systemd[1]: Reached target initrd.target. Jul 2 07:52:57.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.709757 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:52:57.251626 ignition[867]: INFO : Ignition 2.14.0 Jul 2 07:52:57.251626 ignition[867]: INFO : Stage: umount Jul 2 07:52:57.251626 ignition[867]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:52:57.251626 ignition[867]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:52:57.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.710975 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:52:57.329614 iscsid[694]: iscsid shutting down. Jul 2 07:52:57.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.344812 ignition[867]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:52:57.344812 ignition[867]: INFO : umount: umount passed Jul 2 07:52:57.344812 ignition[867]: INFO : Ignition finished successfully Jul 2 07:52:57.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.735078 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:52:57.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.753194 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:52:57.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.800756 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:52:57.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.809948 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:52:57.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.827958 systemd[1]: Stopped target timers.target. Jul 2 07:52:57.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.847946 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:52:56.848146 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:52:56.888116 systemd[1]: Stopped target initrd.target. Jul 2 07:52:56.929904 systemd[1]: Stopped target basic.target. Jul 2 07:52:56.943871 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:52:56.972903 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:52:57.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:56.980941 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:52:57.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.003877 systemd[1]: Stopped target remote-fs.target. Jul 2 07:52:57.028862 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:52:57.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.050919 systemd[1]: Stopped target sysinit.target. Jul 2 07:52:57.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.065877 systemd[1]: Stopped target local-fs.target. Jul 2 07:52:57.081875 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:52:57.098888 systemd[1]: Stopped target swap.target. Jul 2 07:52:57.112827 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:52:57.113013 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:52:57.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.130040 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:52:57.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.691000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:52:57.165839 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:52:57.166050 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:52:57.174134 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:52:57.174414 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:52:57.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.218083 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:52:57.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.218258 systemd[1]: Stopped ignition-files.service. Jul 2 07:52:57.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.234462 systemd[1]: Stopping ignition-mount.service... Jul 2 07:52:57.265915 systemd[1]: Stopping iscsid.service... Jul 2 07:52:57.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.273735 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:52:57.273966 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:52:57.291620 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:52:57.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.321755 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:52:57.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.322035 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:52:57.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.337866 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:52:57.338059 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:52:57.356693 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:52:57.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.357824 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:52:57.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.357939 systemd[1]: Stopped iscsid.service. Jul 2 07:52:57.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:52:57.371367 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:52:57.371504 systemd[1]: Stopped ignition-mount.service. Jul 2 07:52:57.378474 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:52:57.378599 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:52:57.399367 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:52:57.399532 systemd[1]: Stopped ignition-disks.service. Jul 2 07:52:58.035631 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). Jul 2 07:52:57.413664 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:52:57.413748 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:52:57.428699 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:52:57.428783 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:52:57.443712 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:52:57.443798 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:52:57.459703 systemd[1]: Stopped target paths.target. Jul 2 07:52:57.473595 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:52:57.477544 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:52:57.489608 systemd[1]: Stopped target slices.target. Jul 2 07:52:57.502615 systemd[1]: Stopped target sockets.target. Jul 2 07:52:57.515656 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:52:57.515731 systemd[1]: Closed iscsid.socket. Jul 2 07:52:57.529663 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:52:57.529759 systemd[1]: Stopped ignition-setup.service. Jul 2 07:52:57.545734 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:52:57.545827 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:52:57.561954 systemd[1]: Stopping iscsiuio.service... Jul 2 07:52:57.577129 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:52:57.577253 systemd[1]: Stopped iscsiuio.service. Jul 2 07:52:57.584256 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:52:57.584367 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:52:57.606744 systemd[1]: Stopped target network.target. Jul 2 07:52:57.620759 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:52:57.620828 systemd[1]: Closed iscsiuio.socket. Jul 2 07:52:57.628979 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:52:57.632521 systemd-networkd[684]: eth0: DHCPv6 lease lost Jul 2 07:52:57.641926 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:52:57.661939 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:52:57.662064 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:52:57.678392 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:52:57.678561 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:52:57.693332 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:52:57.693377 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:52:57.708629 systemd[1]: Stopping network-cleanup.service... Jul 2 07:52:57.715759 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:52:57.715863 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:52:57.745834 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:52:57.745913 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:52:57.761885 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:52:57.761954 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:52:57.777867 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:52:57.794233 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:52:57.794928 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:52:57.795089 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:52:57.809007 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:52:57.809248 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:52:57.823757 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:52:57.823819 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:52:57.841730 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:52:57.841808 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:52:57.848959 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:52:57.849038 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:52:57.870825 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:52:57.870905 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:52:57.889891 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:52:57.914594 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:52:57.914726 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:52:57.930477 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:52:57.930640 systemd[1]: Stopped network-cleanup.service. Jul 2 07:52:57.946057 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:52:57.946170 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:52:57.961926 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:52:57.977734 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:52:58.000116 systemd[1]: Switching root. Jul 2 07:52:58.047625 systemd-journald[189]: Journal stopped Jul 2 07:53:02.631689 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:53:02.631901 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:53:02.631931 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:53:02.631954 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:53:02.631982 kernel: SELinux: policy capability open_perms=1 Jul 2 07:53:02.632005 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:53:02.632032 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:53:02.632055 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:53:02.632077 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:53:02.632100 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:53:02.632125 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:53:02.632151 systemd[1]: Successfully loaded SELinux policy in 110.970ms. Jul 2 07:53:02.632199 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.827ms. Jul 2 07:53:02.632233 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:53:02.632260 systemd[1]: Detected virtualization kvm. Jul 2 07:53:02.632285 systemd[1]: Detected architecture x86-64. Jul 2 07:53:02.632308 systemd[1]: Detected first boot. Jul 2 07:53:02.632334 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:53:02.632357 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:53:02.632386 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:53:02.632415 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:02.632484 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:02.632514 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:02.632544 kernel: kauditd_printk_skb: 48 callbacks suppressed Jul 2 07:53:02.632568 kernel: audit: type=1334 audit(1719906781.749:88): prog-id=12 op=LOAD Jul 2 07:53:02.632595 kernel: audit: type=1334 audit(1719906781.749:89): prog-id=3 op=UNLOAD Jul 2 07:53:02.632617 kernel: audit: type=1334 audit(1719906781.755:90): prog-id=13 op=LOAD Jul 2 07:53:02.632638 kernel: audit: type=1334 audit(1719906781.762:91): prog-id=14 op=LOAD Jul 2 07:53:02.632660 kernel: audit: type=1334 audit(1719906781.762:92): prog-id=4 op=UNLOAD Jul 2 07:53:02.632683 kernel: audit: type=1334 audit(1719906781.762:93): prog-id=5 op=UNLOAD Jul 2 07:53:02.632706 kernel: audit: type=1334 audit(1719906781.769:94): prog-id=15 op=LOAD Jul 2 07:53:02.632728 kernel: audit: type=1334 audit(1719906781.769:95): prog-id=12 op=UNLOAD Jul 2 07:53:02.632750 kernel: audit: type=1334 audit(1719906781.776:96): prog-id=16 op=LOAD Jul 2 07:53:02.632777 kernel: audit: type=1334 audit(1719906781.783:97): prog-id=17 op=LOAD Jul 2 07:53:02.632801 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:53:02.632826 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:53:02.632850 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:53:02.632873 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:53:02.632896 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:53:02.632919 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 07:53:02.632943 systemd[1]: Created slice system-getty.slice. Jul 2 07:53:02.632970 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:53:02.632994 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:53:02.633018 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:53:02.633043 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:53:02.633066 systemd[1]: Created slice user.slice. Jul 2 07:53:02.633091 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:53:02.633115 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:53:02.633139 systemd[1]: Set up automount boot.automount. Jul 2 07:53:02.633162 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:53:02.633190 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:53:02.633214 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:53:02.633246 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:53:02.633270 systemd[1]: Reached target integritysetup.target. Jul 2 07:53:02.633293 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:53:02.633317 systemd[1]: Reached target remote-fs.target. Jul 2 07:53:02.633341 systemd[1]: Reached target slices.target. Jul 2 07:53:02.633364 systemd[1]: Reached target swap.target. Jul 2 07:53:02.633388 systemd[1]: Reached target torcx.target. Jul 2 07:53:02.633416 systemd[1]: Reached target veritysetup.target. Jul 2 07:53:02.633462 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:53:02.633484 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:53:02.633508 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:53:02.633532 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:53:02.633556 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:53:02.633579 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:53:02.633603 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:53:02.633629 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:53:02.633653 systemd[1]: Mounting media.mount... Jul 2 07:53:02.633683 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:02.633707 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:53:02.633732 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:53:02.633755 systemd[1]: Mounting tmp.mount... Jul 2 07:53:02.633777 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:53:02.633800 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:02.633823 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:53:02.633846 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:53:02.633869 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:02.633894 systemd[1]: Starting modprobe@drm.service... Jul 2 07:53:02.633916 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:02.633941 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:53:02.633965 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:02.633988 kernel: fuse: init (API version 7.34) Jul 2 07:53:02.634012 kernel: loop: module loaded Jul 2 07:53:02.634036 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:53:02.634059 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:53:02.634082 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:53:02.634116 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:53:02.634142 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:53:02.634166 systemd[1]: Stopped systemd-journald.service. Jul 2 07:53:02.634188 systemd[1]: Starting systemd-journald.service... Jul 2 07:53:02.634217 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:53:02.634250 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:53:02.634282 systemd-journald[992]: Journal started Jul 2 07:53:02.634372 systemd-journald[992]: Runtime Journal (/run/log/journal/73c009603c93382b7dfd044c1e0e519d) is 8.0M, max 148.8M, 140.8M free. Jul 2 07:52:58.048000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:52:58.325000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:52:58.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:52:58.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:52:58.477000 audit: BPF prog-id=10 op=LOAD Jul 2 07:52:58.477000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:52:58.477000 audit: BPF prog-id=11 op=LOAD Jul 2 07:52:58.477000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:52:58.629000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:52:58.629000 audit[900]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0000245b2 a1=c00002a708 a2=c000028a40 a3=32 items=0 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:58.629000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:52:58.639000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:52:58.639000 audit[900]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000024689 a2=1ed a3=0 items=2 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:52:58.639000 audit: CWD cwd="/" Jul 2 07:52:58.639000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:52:58.639000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:52:58.639000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:53:01.749000 audit: BPF prog-id=12 op=LOAD Jul 2 07:53:01.749000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:53:01.755000 audit: BPF prog-id=13 op=LOAD Jul 2 07:53:01.762000 audit: BPF prog-id=14 op=LOAD Jul 2 07:53:01.762000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:53:01.762000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:53:01.769000 audit: BPF prog-id=15 op=LOAD Jul 2 07:53:01.769000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:53:01.776000 audit: BPF prog-id=16 op=LOAD Jul 2 07:53:01.783000 audit: BPF prog-id=17 op=LOAD Jul 2 07:53:01.783000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:53:01.783000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:53:01.790000 audit: BPF prog-id=18 op=LOAD Jul 2 07:53:01.790000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:53:01.825000 audit: BPF prog-id=19 op=LOAD Jul 2 07:53:01.825000 audit: BPF prog-id=20 op=LOAD Jul 2 07:53:01.825000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:53:01.825000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:53:01.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:01.842000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:53:01.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:01.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.584000 audit: BPF prog-id=21 op=LOAD Jul 2 07:53:02.584000 audit: BPF prog-id=22 op=LOAD Jul 2 07:53:02.584000 audit: BPF prog-id=23 op=LOAD Jul 2 07:53:02.584000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:53:02.584000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:53:02.626000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:53:02.626000 audit[992]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc8ccb8620 a2=4000 a3=7ffc8ccb86bc items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:02.626000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:53:01.749085 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:52:58.624591 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:01.827694 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:52:58.625598 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:52:58.625635 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:52:58.625687 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:52:58.625707 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:52:58.625767 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:52:58.625793 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:52:58.626148 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:52:58.626225 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:52:58.626250 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:52:58.629193 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:52:58.629262 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:52:58.629300 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:52:58.629330 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:52:58.629364 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:52:58.629392 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:52:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:53:01.139634 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:53:01Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:01.139928 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:53:01Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:01.140078 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:53:01Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:01.140304 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:53:01Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:53:01.140365 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:53:01Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:53:01.140453 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-07-02T07:53:01Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:53:02.644034 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:53:02.657467 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:53:02.671490 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:53:02.677480 systemd[1]: Stopped verity-setup.service. Jul 2 07:53:02.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.696448 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:02.706478 systemd[1]: Started systemd-journald.service. Jul 2 07:53:02.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.714853 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:53:02.721797 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:53:02.729801 systemd[1]: Mounted media.mount. Jul 2 07:53:02.736780 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:53:02.745753 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:53:02.754741 systemd[1]: Mounted tmp.mount. Jul 2 07:53:02.761822 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:53:02.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.770935 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:53:02.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.779937 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:53:02.780150 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:53:02.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.789147 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:02.789448 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:02.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.798017 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:53:02.798237 systemd[1]: Finished modprobe@drm.service. Jul 2 07:53:02.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.807991 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:02.808191 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:02.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.817022 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:53:02.817238 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:53:02.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.825962 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:02.826176 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:02.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.835023 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:53:02.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.843999 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:53:02.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.852950 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:53:02.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.861972 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:53:02.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.871565 systemd[1]: Reached target network-pre.target. Jul 2 07:53:02.881099 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:53:02.891005 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:53:02.898585 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:53:02.901407 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:53:02.910179 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:53:02.918622 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:02.920381 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:53:02.927642 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:02.930014 systemd-journald[992]: Time spent on flushing to /var/log/journal/73c009603c93382b7dfd044c1e0e519d is 67.765ms for 1156 entries. Jul 2 07:53:02.930014 systemd-journald[992]: System Journal (/var/log/journal/73c009603c93382b7dfd044c1e0e519d) is 8.0M, max 584.8M, 576.8M free. Jul 2 07:53:03.055779 systemd-journald[992]: Received client request to flush runtime journal. Jul 2 07:53:02.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:03.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:03.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:02.929536 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:53:02.946493 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:53:02.955202 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:53:02.966841 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:53:03.058617 udevadm[1006]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 07:53:02.975751 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:53:02.984978 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:53:02.994059 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:53:03.006277 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:53:03.031151 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:53:03.057127 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:53:03.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:03.597764 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:53:03.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:03.605000 audit: BPF prog-id=24 op=LOAD Jul 2 07:53:03.606000 audit: BPF prog-id=25 op=LOAD Jul 2 07:53:03.606000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:53:03.606000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:53:03.608518 systemd[1]: Starting systemd-udevd.service... Jul 2 07:53:03.630998 systemd-udevd[1009]: Using default interface naming scheme 'v252'. Jul 2 07:53:03.681096 systemd[1]: Started systemd-udevd.service. Jul 2 07:53:03.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:03.690000 audit: BPF prog-id=26 op=LOAD Jul 2 07:53:03.693268 systemd[1]: Starting systemd-networkd.service... Jul 2 07:53:03.709000 audit: BPF prog-id=27 op=LOAD Jul 2 07:53:03.709000 audit: BPF prog-id=28 op=LOAD Jul 2 07:53:03.709000 audit: BPF prog-id=29 op=LOAD Jul 2 07:53:03.712297 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:53:03.770506 systemd[1]: Started systemd-userdbd.service. Jul 2 07:53:03.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:03.779249 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:53:03.863473 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:53:03.874452 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:53:03.916814 systemd-networkd[1021]: lo: Link UP Jul 2 07:53:03.916833 systemd-networkd[1021]: lo: Gained carrier Jul 2 07:53:03.917645 systemd-networkd[1021]: Enumeration completed Jul 2 07:53:03.917806 systemd[1]: Started systemd-networkd.service. Jul 2 07:53:03.918181 systemd-networkd[1021]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:53:03.920095 systemd-networkd[1021]: eth0: Link UP Jul 2 07:53:03.920112 systemd-networkd[1021]: eth0: Gained carrier Jul 2 07:53:03.927448 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Jul 2 07:53:03.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:03.942234 systemd-networkd[1021]: eth0: DHCPv4 address 10.128.0.53/32, gateway 10.128.0.1 acquired from 169.254.169.254 Jul 2 07:53:03.942491 kernel: ACPI: button: Sleep Button [SLPF] Jul 2 07:53:03.947000 audit[1016]: AVC avc: denied { confidentiality } for pid=1016 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:53:03.983454 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1013) Jul 2 07:53:03.947000 audit[1016]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e222095310 a1=3207c a2=7fc18972dbc5 a3=5 items=108 ppid=1009 pid=1016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:03.947000 audit: CWD cwd="/" Jul 2 07:53:03.947000 audit: PATH item=0 name=(null) inode=31 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=1 name=(null) inode=14655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=2 name=(null) inode=14655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=3 name=(null) inode=14656 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=4 name=(null) inode=14655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=5 name=(null) inode=14657 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=6 name=(null) inode=14655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=7 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=8 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=9 name=(null) inode=14659 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=10 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=11 name=(null) inode=14660 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=12 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=13 name=(null) inode=14661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=14 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=15 name=(null) inode=14662 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=16 name=(null) inode=14658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=17 name=(null) inode=14663 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=18 name=(null) inode=14655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=19 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=20 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=21 name=(null) inode=14665 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=22 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=23 name=(null) inode=14666 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=24 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=25 name=(null) inode=14667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=26 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=27 name=(null) inode=14668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=28 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=29 name=(null) inode=14669 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=30 name=(null) inode=14655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=31 name=(null) inode=14670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=32 name=(null) inode=14670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=33 name=(null) inode=14671 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=34 name=(null) inode=14670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=35 name=(null) inode=14672 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=36 name=(null) inode=14670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=37 name=(null) inode=14673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=38 name=(null) inode=14670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=39 name=(null) inode=14674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=40 name=(null) inode=14670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=41 name=(null) inode=14675 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=42 name=(null) inode=14655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=43 name=(null) inode=14676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=44 name=(null) inode=14676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=45 name=(null) inode=14677 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=46 name=(null) inode=14676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=47 name=(null) inode=14678 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=48 name=(null) inode=14676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=49 name=(null) inode=14679 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=50 name=(null) inode=14676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=51 name=(null) inode=14680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=52 name=(null) inode=14676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=53 name=(null) inode=14681 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=54 name=(null) inode=31 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=55 name=(null) inode=14682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=56 name=(null) inode=14682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=57 name=(null) inode=14683 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=58 name=(null) inode=14682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=59 name=(null) inode=14684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=60 name=(null) inode=14682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=61 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=62 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=63 name=(null) inode=14686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=64 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=65 name=(null) inode=14687 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=66 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=67 name=(null) inode=14688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=68 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=69 name=(null) inode=14689 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=70 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=71 name=(null) inode=14690 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=72 name=(null) inode=14682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=73 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=74 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=75 name=(null) inode=14692 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=76 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=77 name=(null) inode=14693 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=78 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=79 name=(null) inode=14694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=80 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=81 name=(null) inode=14695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=82 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=83 name=(null) inode=14696 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=84 name=(null) inode=14682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=85 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=86 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=87 name=(null) inode=14698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=88 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=89 name=(null) inode=14699 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=90 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=91 name=(null) inode=14700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=92 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=93 name=(null) inode=14701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=94 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=95 name=(null) inode=14702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=96 name=(null) inode=14682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=97 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=98 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=99 name=(null) inode=14704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=100 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=101 name=(null) inode=14705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=102 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=103 name=(null) inode=14706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=104 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=105 name=(null) inode=14707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=106 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PATH item=107 name=(null) inode=14708 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:53:03.947000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:53:04.024453 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Jul 2 07:53:04.037460 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Jul 2 07:53:04.047468 kernel: EDAC MC: Ver: 3.0.0 Jul 2 07:53:04.078571 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:53:04.096885 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:53:04.110947 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:53:04.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.122275 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:53:04.151037 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:53:04.179888 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:53:04.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.188810 systemd[1]: Reached target cryptsetup.target. Jul 2 07:53:04.199069 systemd[1]: Starting lvm2-activation.service... Jul 2 07:53:04.205220 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:53:04.236835 systemd[1]: Finished lvm2-activation.service. Jul 2 07:53:04.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.245777 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:53:04.254603 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:53:04.254658 systemd[1]: Reached target local-fs.target. Jul 2 07:53:04.263606 systemd[1]: Reached target machines.target. Jul 2 07:53:04.273204 systemd[1]: Starting ldconfig.service... Jul 2 07:53:04.281579 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:04.281673 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:04.283355 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:53:04.292219 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:53:04.304300 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:53:04.306216 systemd[1]: Starting systemd-sysext.service... Jul 2 07:53:04.307209 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1049 (bootctl) Jul 2 07:53:04.309682 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:53:04.324019 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:53:04.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.339506 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:53:04.349966 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:53:04.350257 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:53:04.375466 kernel: loop0: detected capacity change from 0 to 211296 Jul 2 07:53:04.472876 systemd-fsck[1059]: fsck.fat 4.2 (2021-01-31) Jul 2 07:53:04.472876 systemd-fsck[1059]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 07:53:04.476320 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:53:04.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.488864 systemd[1]: Mounting boot.mount... Jul 2 07:53:04.589363 systemd[1]: Mounted boot.mount. Jul 2 07:53:04.615344 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:53:04.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.746276 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:53:04.747194 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:53:04.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.780460 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:53:04.805471 kernel: loop1: detected capacity change from 0 to 211296 Jul 2 07:53:04.830641 (sd-sysext)[1064]: Using extensions 'kubernetes'. Jul 2 07:53:04.831557 (sd-sysext)[1064]: Merged extensions into '/usr'. Jul 2 07:53:04.856190 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:04.859787 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:53:04.867791 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:04.870531 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:04.880522 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:04.890486 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:04.897660 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:04.897902 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:04.898111 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:04.902574 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:53:04.910185 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:04.910442 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:04.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.919424 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:04.919694 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:04.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.929488 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:04.929753 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:04.932397 ldconfig[1048]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:53:04.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.939289 systemd[1]: Finished ldconfig.service. Jul 2 07:53:04.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.947603 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:04.947775 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:04.949860 systemd[1]: Finished systemd-sysext.service. Jul 2 07:53:04.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:04.960343 systemd[1]: Starting ensure-sysext.service... Jul 2 07:53:04.969081 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:53:04.981198 systemd[1]: Reloading. Jul 2 07:53:04.999034 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:53:05.006997 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:53:05.022848 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:53:05.089609 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2024-07-02T07:53:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:05.090225 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2024-07-02T07:53:05Z" level=info msg="torcx already run" Jul 2 07:53:05.234179 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:05.234487 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:05.274581 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:05.354000 audit: BPF prog-id=30 op=LOAD Jul 2 07:53:05.354000 audit: BPF prog-id=31 op=LOAD Jul 2 07:53:05.354000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:53:05.354000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:53:05.356000 audit: BPF prog-id=32 op=LOAD Jul 2 07:53:05.356000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:53:05.356000 audit: BPF prog-id=33 op=LOAD Jul 2 07:53:05.356000 audit: BPF prog-id=34 op=LOAD Jul 2 07:53:05.356000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:53:05.356000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:53:05.357000 audit: BPF prog-id=35 op=LOAD Jul 2 07:53:05.357000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:53:05.358000 audit: BPF prog-id=36 op=LOAD Jul 2 07:53:05.358000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:53:05.358000 audit: BPF prog-id=37 op=LOAD Jul 2 07:53:05.358000 audit: BPF prog-id=38 op=LOAD Jul 2 07:53:05.358000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:53:05.358000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:53:05.368811 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:53:05.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:05.383697 systemd[1]: Starting audit-rules.service... Jul 2 07:53:05.392376 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:53:05.400531 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:53:05.411139 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:53:05.419000 audit: BPF prog-id=39 op=LOAD Jul 2 07:53:05.422604 systemd[1]: Starting systemd-resolved.service... Jul 2 07:53:05.429000 audit: BPF prog-id=40 op=LOAD Jul 2 07:53:05.432835 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:53:05.441809 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:53:05.450635 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:53:05.451000 audit[1160]: SYSTEM_BOOT pid=1160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:53:05.460416 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:53:05.460703 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:53:05.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:05.466000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:53:05.466000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe01622830 a2=420 a3=0 items=0 ppid=1135 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:05.466000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:53:05.469133 augenrules[1165]: No rules Jul 2 07:53:05.470656 systemd[1]: Finished audit-rules.service. Jul 2 07:53:05.478227 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:53:05.494168 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:05.495864 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:05.501511 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:05.510810 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:05.519806 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:05.528847 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:53:05.535548 enable-oslogin[1173]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:53:05.537630 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:05.538000 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:05.540682 systemd[1]: Starting systemd-update-done.service... Jul 2 07:53:05.547559 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:53:05.547861 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:05.551844 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:05.552123 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:05.561758 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:05.561981 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:05.571551 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:05.571770 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:05.581514 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:53:05.581757 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:53:05.591516 systemd[1]: Finished systemd-update-done.service. Jul 2 07:53:05.603621 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:05.604147 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:53:05.608117 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:53:05.164194 systemd-timesyncd[1156]: Contacted time server 169.254.169.254:123 (169.254.169.254). Jul 2 07:53:05.208132 systemd-journald[992]: Time jumped backwards, rotating. Jul 2 07:53:05.171035 systemd-timesyncd[1156]: Initial clock synchronization to Tue 2024-07-02 07:53:05.164055 UTC. Jul 2 07:53:05.173108 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:53:05.183361 systemd[1]: Starting modprobe@loop.service... Jul 2 07:53:05.209723 enable-oslogin[1180]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:53:05.186792 systemd-resolved[1151]: Positive Trust Anchors: Jul 2 07:53:05.186818 systemd-resolved[1151]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:53:05.186882 systemd-resolved[1151]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:53:05.193257 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:53:05.202281 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:53:05.202537 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:05.202732 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:53:05.202857 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:53:05.204731 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:53:05.214564 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:53:05.222298 systemd-resolved[1151]: Defaulting to hostname 'linux'. Jul 2 07:53:05.223996 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:53:05.224238 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:53:05.233652 systemd[1]: Started systemd-resolved.service. Jul 2 07:53:05.242830 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:53:05.243040 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:53:05.251873 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:53:05.252135 systemd[1]: Finished modprobe@loop.service. Jul 2 07:53:05.260826 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:53:05.261055 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:53:05.271005 systemd[1]: Reached target network.target. Jul 2 07:53:05.279254 systemd-networkd[1021]: eth0: Gained IPv6LL Jul 2 07:53:05.279471 systemd[1]: Reached target nss-lookup.target. Jul 2 07:53:05.288359 systemd[1]: Reached target time-set.target. Jul 2 07:53:05.297346 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:53:05.297631 systemd[1]: Reached target sysinit.target. Jul 2 07:53:05.306537 systemd[1]: Started motdgen.path. Jul 2 07:53:05.313515 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:53:05.323808 systemd[1]: Started logrotate.timer. Jul 2 07:53:05.331692 systemd[1]: Started mdadm.timer. Jul 2 07:53:05.339478 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:53:05.348401 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:53:05.348624 systemd[1]: Reached target paths.target. Jul 2 07:53:05.355381 systemd[1]: Reached target timers.target. Jul 2 07:53:05.362906 systemd[1]: Listening on dbus.socket. Jul 2 07:53:05.372039 systemd[1]: Starting docker.socket... Jul 2 07:53:05.383917 systemd[1]: Listening on sshd.socket. Jul 2 07:53:05.392514 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:05.392778 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:53:05.395796 systemd[1]: Listening on docker.socket. Jul 2 07:53:05.405872 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:53:05.406189 systemd[1]: Reached target sockets.target. Jul 2 07:53:05.414400 systemd[1]: Reached target basic.target. Jul 2 07:53:05.421417 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:53:05.421691 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:53:05.423901 systemd[1]: Starting containerd.service... Jul 2 07:53:05.433433 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 07:53:05.444788 systemd[1]: Starting dbus.service... Jul 2 07:53:05.454576 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:53:05.463448 systemd[1]: Starting extend-filesystems.service... Jul 2 07:53:05.470214 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:53:05.471845 jq[1186]: false Jul 2 07:53:05.472697 systemd[1]: Starting modprobe@drm.service... Jul 2 07:53:05.482344 systemd[1]: Starting motdgen.service... Jul 2 07:53:05.491899 systemd[1]: Starting prepare-helm.service... Jul 2 07:53:05.501393 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:53:05.510439 systemd[1]: Starting sshd-keygen.service... Jul 2 07:53:05.519564 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:53:05.521373 extend-filesystems[1187]: Found loop1 Jul 2 07:53:05.528325 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:53:05.528623 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Jul 2 07:53:05.535644 extend-filesystems[1187]: Found sda Jul 2 07:53:05.535644 extend-filesystems[1187]: Found sda1 Jul 2 07:53:05.535644 extend-filesystems[1187]: Found sda2 Jul 2 07:53:05.535644 extend-filesystems[1187]: Found sda3 Jul 2 07:53:05.529463 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:53:05.639386 extend-filesystems[1187]: Found usr Jul 2 07:53:05.639386 extend-filesystems[1187]: Found sda4 Jul 2 07:53:05.639386 extend-filesystems[1187]: Found sda6 Jul 2 07:53:05.639386 extend-filesystems[1187]: Found sda7 Jul 2 07:53:05.639386 extend-filesystems[1187]: Found sda9 Jul 2 07:53:05.639386 extend-filesystems[1187]: Checking size of /dev/sda9 Jul 2 07:53:05.639386 extend-filesystems[1187]: Resized partition /dev/sda9 Jul 2 07:53:05.831697 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Jul 2 07:53:05.831753 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Jul 2 07:53:05.531815 systemd[1]: Starting update-engine.service... Jul 2 07:53:05.832111 update_engine[1207]: I0702 07:53:05.701835 1207 main.cc:92] Flatcar Update Engine starting Jul 2 07:53:05.832111 update_engine[1207]: I0702 07:53:05.736723 1207 update_check_scheduler.cc:74] Next update check in 7m22s Jul 2 07:53:05.712472 dbus-daemon[1185]: [system] SELinux support is enabled Jul 2 07:53:05.832803 extend-filesystems[1217]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 07:53:05.832803 extend-filesystems[1217]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Jul 2 07:53:05.832803 extend-filesystems[1217]: old_desc_blocks = 1, new_desc_blocks = 2 Jul 2 07:53:05.832803 extend-filesystems[1217]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Jul 2 07:53:05.888261 jq[1209]: true Jul 2 07:53:05.544957 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:53:05.725252 dbus-daemon[1185]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1021 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 07:53:05.888732 extend-filesystems[1187]: Resized filesystem in /dev/sda9 Jul 2 07:53:05.554888 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:53:05.753405 dbus-daemon[1185]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 07:53:05.905481 tar[1216]: linux-amd64/helm Jul 2 07:53:05.555200 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:53:05.906608 env[1220]: time="2024-07-02T07:53:05.862224025Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:53:05.557223 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:53:05.907040 jq[1219]: true Jul 2 07:53:05.557419 systemd[1]: Finished modprobe@drm.service. Jul 2 07:53:05.562941 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:53:05.563170 systemd[1]: Finished motdgen.service. Jul 2 07:53:05.589508 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:53:05.589817 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:53:05.598980 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:53:05.908400 bash[1249]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:53:05.613987 systemd[1]: Reached target network-online.target. Jul 2 07:53:05.908888 mkfs.ext4[1232]: mke2fs 1.46.5 (30-Dec-2021) Jul 2 07:53:05.908888 mkfs.ext4[1232]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Jul 2 07:53:05.908888 mkfs.ext4[1232]: Creating filesystem with 262144 4k blocks and 65536 inodes Jul 2 07:53:05.908888 mkfs.ext4[1232]: Filesystem UUID: 249cba01-2f64-4387-a6fd-83f34178dfa2 Jul 2 07:53:05.908888 mkfs.ext4[1232]: Superblock backups stored on blocks: Jul 2 07:53:05.908888 mkfs.ext4[1232]: 32768, 98304, 163840, 229376 Jul 2 07:53:05.908888 mkfs.ext4[1232]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:53:05.908888 mkfs.ext4[1232]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:53:05.908888 mkfs.ext4[1232]: Creating journal (8192 blocks): done Jul 2 07:53:05.908888 mkfs.ext4[1232]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:53:05.624677 systemd[1]: Starting kubelet.service... Jul 2 07:53:05.648148 systemd[1]: Starting oem-gce.service... Jul 2 07:53:05.666527 systemd[1]: Starting systemd-logind.service... Jul 2 07:53:05.673985 systemd[1]: Finished ensure-sysext.service. Jul 2 07:53:05.712704 systemd[1]: Started dbus.service. Jul 2 07:53:05.732646 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:53:05.732687 systemd[1]: Reached target system-config.target. Jul 2 07:53:05.741277 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:53:05.741305 systemd[1]: Reached target user-config.target. Jul 2 07:53:05.752850 systemd[1]: Started update-engine.service. Jul 2 07:53:05.786484 systemd[1]: Started locksmithd.service. Jul 2 07:53:05.811424 systemd[1]: Starting systemd-hostnamed.service... Jul 2 07:53:05.843100 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:53:05.858789 systemd[1]: Finished extend-filesystems.service. Jul 2 07:53:05.896363 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:53:05.942127 umount[1255]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Jul 2 07:53:05.965096 kernel: loop2: detected capacity change from 0 to 2097152 Jul 2 07:53:05.993762 coreos-metadata[1184]: Jul 02 07:53:05.993 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Jul 2 07:53:05.997173 coreos-metadata[1184]: Jul 02 07:53:05.997 INFO Fetch failed with 404: resource not found Jul 2 07:53:05.997310 coreos-metadata[1184]: Jul 02 07:53:05.997 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Jul 2 07:53:05.998288 coreos-metadata[1184]: Jul 02 07:53:05.998 INFO Fetch successful Jul 2 07:53:05.998408 coreos-metadata[1184]: Jul 02 07:53:05.998 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Jul 2 07:53:05.999326 coreos-metadata[1184]: Jul 02 07:53:05.999 INFO Fetch failed with 404: resource not found Jul 2 07:53:05.999834 coreos-metadata[1184]: Jul 02 07:53:05.999 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Jul 2 07:53:06.000128 coreos-metadata[1184]: Jul 02 07:53:06.000 INFO Fetch failed with 404: resource not found Jul 2 07:53:06.000211 coreos-metadata[1184]: Jul 02 07:53:06.000 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Jul 2 07:53:06.010014 coreos-metadata[1184]: Jul 02 07:53:06.001 INFO Fetch successful Jul 2 07:53:06.010171 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:53:06.004409 unknown[1184]: wrote ssh authorized keys file for user: core Jul 2 07:53:06.047149 update-ssh-keys[1259]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:53:06.049268 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 07:53:06.115410 systemd-logind[1228]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:53:06.118710 dbus-daemon[1185]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 07:53:06.118947 systemd[1]: Started systemd-hostnamed.service. Jul 2 07:53:06.119881 dbus-daemon[1185]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1250 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 07:53:06.120156 systemd-logind[1228]: Watching system buttons on /dev/input/event2 (Sleep Button) Jul 2 07:53:06.120660 systemd-logind[1228]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:53:06.125572 systemd-logind[1228]: New seat seat0. Jul 2 07:53:06.133675 systemd[1]: Starting polkit.service... Jul 2 07:53:06.147788 systemd[1]: Started systemd-logind.service. Jul 2 07:53:06.173731 env[1220]: time="2024-07-02T07:53:06.173678584Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:53:06.175329 env[1220]: time="2024-07-02T07:53:06.175293872Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:06.180188 env[1220]: time="2024-07-02T07:53:06.180136764Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:06.181132 env[1220]: time="2024-07-02T07:53:06.181099918Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:06.181602 env[1220]: time="2024-07-02T07:53:06.181568820Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:06.183134 env[1220]: time="2024-07-02T07:53:06.183102200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:06.183285 env[1220]: time="2024-07-02T07:53:06.183259357Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:53:06.183380 env[1220]: time="2024-07-02T07:53:06.183360206Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:06.183596 env[1220]: time="2024-07-02T07:53:06.183572385Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:06.184642 env[1220]: time="2024-07-02T07:53:06.184611332Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:53:06.197778 env[1220]: time="2024-07-02T07:53:06.197702932Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:53:06.197995 env[1220]: time="2024-07-02T07:53:06.197970674Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:53:06.198358 env[1220]: time="2024-07-02T07:53:06.198316381Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:53:06.198507 env[1220]: time="2024-07-02T07:53:06.198484255Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:53:06.205054 env[1220]: time="2024-07-02T07:53:06.205004225Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:53:06.205262 env[1220]: time="2024-07-02T07:53:06.205239900Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:53:06.205400 env[1220]: time="2024-07-02T07:53:06.205377493Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:53:06.205570 env[1220]: time="2024-07-02T07:53:06.205541305Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.205752 env[1220]: time="2024-07-02T07:53:06.205729394Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.205889 env[1220]: time="2024-07-02T07:53:06.205867785Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.206002 env[1220]: time="2024-07-02T07:53:06.205983945Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.206142 env[1220]: time="2024-07-02T07:53:06.206119184Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.206277 env[1220]: time="2024-07-02T07:53:06.206257083Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.206396 env[1220]: time="2024-07-02T07:53:06.206378307Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.206522 env[1220]: time="2024-07-02T07:53:06.206500210Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.206644 env[1220]: time="2024-07-02T07:53:06.206624282Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:53:06.206904 env[1220]: time="2024-07-02T07:53:06.206879995Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:53:06.208530 env[1220]: time="2024-07-02T07:53:06.208499070Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:53:06.209234 env[1220]: time="2024-07-02T07:53:06.209205357Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:53:06.209368 env[1220]: time="2024-07-02T07:53:06.209343418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.209495 env[1220]: time="2024-07-02T07:53:06.209471901Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:53:06.209654 env[1220]: time="2024-07-02T07:53:06.209635408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.210014 env[1220]: time="2024-07-02T07:53:06.209987864Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.210158 env[1220]: time="2024-07-02T07:53:06.210133639Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.210261 env[1220]: time="2024-07-02T07:53:06.210241004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.210372 env[1220]: time="2024-07-02T07:53:06.210352425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.212152 env[1220]: time="2024-07-02T07:53:06.212121761Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.212281 env[1220]: time="2024-07-02T07:53:06.212259270Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.212374 env[1220]: time="2024-07-02T07:53:06.212356576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.212504 env[1220]: time="2024-07-02T07:53:06.212481891Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:53:06.212765 env[1220]: time="2024-07-02T07:53:06.212744408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.216809 env[1220]: time="2024-07-02T07:53:06.216780738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.216936 env[1220]: time="2024-07-02T07:53:06.216911590Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.217039 env[1220]: time="2024-07-02T07:53:06.217018184Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:53:06.217169 env[1220]: time="2024-07-02T07:53:06.217143399Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:53:06.217270 env[1220]: time="2024-07-02T07:53:06.217252718Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:53:06.218151 env[1220]: time="2024-07-02T07:53:06.218121174Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:53:06.218329 env[1220]: time="2024-07-02T07:53:06.218285543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:53:06.218801 env[1220]: time="2024-07-02T07:53:06.218710441Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:53:06.222878 env[1220]: time="2024-07-02T07:53:06.219014866Z" level=info msg="Connect containerd service" Jul 2 07:53:06.222878 env[1220]: time="2024-07-02T07:53:06.219096091Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:53:06.223632 env[1220]: time="2024-07-02T07:53:06.223586823Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:53:06.226589 env[1220]: time="2024-07-02T07:53:06.226521511Z" level=info msg="Start subscribing containerd event" Jul 2 07:53:06.236564 env[1220]: time="2024-07-02T07:53:06.236515435Z" level=info msg="Start recovering state" Jul 2 07:53:06.236705 env[1220]: time="2024-07-02T07:53:06.236643463Z" level=info msg="Start event monitor" Jul 2 07:53:06.236705 env[1220]: time="2024-07-02T07:53:06.236675301Z" level=info msg="Start snapshots syncer" Jul 2 07:53:06.236705 env[1220]: time="2024-07-02T07:53:06.236690976Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:53:06.236850 env[1220]: time="2024-07-02T07:53:06.236703468Z" level=info msg="Start streaming server" Jul 2 07:53:06.238090 env[1220]: time="2024-07-02T07:53:06.238038353Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:53:06.240298 env[1220]: time="2024-07-02T07:53:06.240268505Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:53:06.242651 systemd[1]: Started containerd.service. Jul 2 07:53:06.243080 env[1220]: time="2024-07-02T07:53:06.243027465Z" level=info msg="containerd successfully booted in 0.387590s" Jul 2 07:53:06.262708 polkitd[1263]: Started polkitd version 121 Jul 2 07:53:06.315413 polkitd[1263]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 07:53:06.316389 polkitd[1263]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 07:53:06.323308 polkitd[1263]: Finished loading, compiling and executing 2 rules Jul 2 07:53:06.327660 dbus-daemon[1185]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 07:53:06.327890 systemd[1]: Started polkit.service. Jul 2 07:53:06.329045 polkitd[1263]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 07:53:06.393278 systemd-hostnamed[1250]: Hostname set to (transient) Jul 2 07:53:06.397821 systemd-resolved[1151]: System hostname changed to 'ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal'. Jul 2 07:53:06.731111 tar[1216]: linux-amd64/LICENSE Jul 2 07:53:06.731257 tar[1216]: linux-amd64/README.md Jul 2 07:53:06.742633 systemd[1]: Finished prepare-helm.service. Jul 2 07:53:07.831811 systemd[1]: Started kubelet.service. Jul 2 07:53:08.079633 locksmithd[1241]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:53:08.248551 sshd_keygen[1212]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:53:08.298448 systemd[1]: Finished sshd-keygen.service. Jul 2 07:53:08.308076 systemd[1]: Starting issuegen.service... Jul 2 07:53:08.318137 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:53:08.318395 systemd[1]: Finished issuegen.service. Jul 2 07:53:08.328809 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:53:08.345164 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:53:08.355999 systemd[1]: Started getty@tty1.service. Jul 2 07:53:08.366059 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:53:08.375235 systemd[1]: Reached target getty.target. Jul 2 07:53:09.093211 kubelet[1279]: E0702 07:53:09.093121 1279 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:53:09.096123 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:53:09.096372 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:53:09.096803 systemd[1]: kubelet.service: Consumed 1.408s CPU time. Jul 2 07:53:11.302114 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Jul 2 07:53:13.437111 kernel: loop2: detected capacity change from 0 to 2097152 Jul 2 07:53:13.459086 systemd-nspawn[1300]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Jul 2 07:53:13.459086 systemd-nspawn[1300]: Press ^] three times within 1s to kill container. Jul 2 07:53:13.474119 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:53:13.558930 systemd[1]: Started oem-gce.service. Jul 2 07:53:13.559403 systemd[1]: Reached target multi-user.target. Jul 2 07:53:13.561754 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:53:13.572011 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:53:13.572291 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:53:13.572841 systemd[1]: Startup finished in 1.019s (kernel) + 7.395s (initrd) + 15.824s (userspace) = 24.238s. Jul 2 07:53:13.626908 systemd-nspawn[1300]: + '[' -e /etc/default/instance_configs.cfg.template ']' Jul 2 07:53:13.626908 systemd-nspawn[1300]: + echo -e '[InstanceSetup]\nset_host_keys = false' Jul 2 07:53:13.627165 systemd-nspawn[1300]: + /usr/bin/google_instance_setup Jul 2 07:53:14.249039 instance-setup[1306]: INFO Running google_set_multiqueue. Jul 2 07:53:14.264541 instance-setup[1306]: INFO Set channels for eth0 to 2. Jul 2 07:53:14.268438 instance-setup[1306]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Jul 2 07:53:14.269797 instance-setup[1306]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Jul 2 07:53:14.270262 instance-setup[1306]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Jul 2 07:53:14.271683 instance-setup[1306]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Jul 2 07:53:14.272041 instance-setup[1306]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Jul 2 07:53:14.273535 instance-setup[1306]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Jul 2 07:53:14.274017 instance-setup[1306]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Jul 2 07:53:14.275461 instance-setup[1306]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Jul 2 07:53:14.286824 instance-setup[1306]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Jul 2 07:53:14.287238 instance-setup[1306]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Jul 2 07:53:14.328554 systemd-nspawn[1300]: + /usr/bin/google_metadata_script_runner --script-type startup Jul 2 07:53:14.661874 startup-script[1337]: INFO Starting startup scripts. Jul 2 07:53:14.675236 startup-script[1337]: INFO No startup scripts found in metadata. Jul 2 07:53:14.675421 startup-script[1337]: INFO Finished running startup scripts. Jul 2 07:53:14.709095 systemd-nspawn[1300]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Jul 2 07:53:14.709095 systemd-nspawn[1300]: + daemon_pids=() Jul 2 07:53:14.709652 systemd-nspawn[1300]: + for d in accounts clock_skew network Jul 2 07:53:14.710025 systemd-nspawn[1300]: + daemon_pids+=($!) Jul 2 07:53:14.710203 systemd-nspawn[1300]: + for d in accounts clock_skew network Jul 2 07:53:14.710279 systemd-nspawn[1300]: + /usr/bin/google_accounts_daemon Jul 2 07:53:14.710685 systemd-nspawn[1300]: + daemon_pids+=($!) Jul 2 07:53:14.710829 systemd-nspawn[1300]: + for d in accounts clock_skew network Jul 2 07:53:14.711214 systemd-nspawn[1300]: + daemon_pids+=($!) Jul 2 07:53:14.711378 systemd-nspawn[1300]: + NOTIFY_SOCKET=/run/systemd/notify Jul 2 07:53:14.711378 systemd-nspawn[1300]: + /usr/bin/systemd-notify --ready Jul 2 07:53:14.712315 systemd-nspawn[1300]: + /usr/bin/google_clock_skew_daemon Jul 2 07:53:14.715322 systemd-nspawn[1300]: + /usr/bin/google_network_daemon Jul 2 07:53:14.759618 systemd-nspawn[1300]: + wait -n 36 37 38 Jul 2 07:53:14.796432 systemd[1]: Created slice system-sshd.slice. Jul 2 07:53:14.798613 systemd[1]: Started sshd@0-10.128.0.53:22-147.75.109.163:50370.service. Jul 2 07:53:15.139503 sshd[1345]: Accepted publickey for core from 147.75.109.163 port 50370 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:15.142903 sshd[1345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:15.163617 systemd[1]: Created slice user-500.slice. Jul 2 07:53:15.165621 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:53:15.174034 systemd-logind[1228]: New session 1 of user core. Jul 2 07:53:15.185290 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:53:15.188621 systemd[1]: Starting user@500.service... Jul 2 07:53:15.224384 (systemd)[1348]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:15.447815 systemd[1348]: Queued start job for default target default.target. Jul 2 07:53:15.448705 systemd[1348]: Reached target paths.target. Jul 2 07:53:15.448741 systemd[1348]: Reached target sockets.target. Jul 2 07:53:15.448767 systemd[1348]: Reached target timers.target. Jul 2 07:53:15.448789 systemd[1348]: Reached target basic.target. Jul 2 07:53:15.448872 systemd[1348]: Reached target default.target. Jul 2 07:53:15.448928 systemd[1348]: Startup finished in 206ms. Jul 2 07:53:15.449092 systemd[1]: Started user@500.service. Jul 2 07:53:15.450806 systemd[1]: Started session-1.scope. Jul 2 07:53:15.548224 groupadd[1361]: group added to /etc/group: name=google-sudoers, GID=1000 Jul 2 07:53:15.552106 groupadd[1361]: group added to /etc/gshadow: name=google-sudoers Jul 2 07:53:15.575583 groupadd[1361]: new group: name=google-sudoers, GID=1000 Jul 2 07:53:15.600988 google-networking[1342]: INFO Starting Google Networking daemon. Jul 2 07:53:15.611258 google-accounts[1340]: INFO Starting Google Accounts daemon. Jul 2 07:53:15.644099 google-clock-skew[1341]: INFO Starting Google Clock Skew daemon. Jul 2 07:53:15.679477 systemd[1]: Started sshd@1-10.128.0.53:22-147.75.109.163:50384.service. Jul 2 07:53:15.693452 google-accounts[1340]: WARNING OS Login not installed. Jul 2 07:53:15.696435 google-accounts[1340]: INFO Creating a new user account for 0. Jul 2 07:53:15.699674 google-clock-skew[1341]: INFO Clock drift token has changed: 0. Jul 2 07:53:15.708262 systemd-nspawn[1300]: hwclock: Cannot access the Hardware Clock via any known method. Jul 2 07:53:15.708389 systemd-nspawn[1300]: hwclock: Use the --verbose option to see the details of our search for an access method. Jul 2 07:53:15.709309 google-clock-skew[1341]: WARNING Failed to sync system time with hardware clock. Jul 2 07:53:15.720729 systemd-nspawn[1300]: useradd: invalid user name '0': use --badname to ignore Jul 2 07:53:15.722092 google-accounts[1340]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Jul 2 07:53:15.982574 sshd[1372]: Accepted publickey for core from 147.75.109.163 port 50384 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:15.984406 sshd[1372]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:15.990691 systemd-logind[1228]: New session 2 of user core. Jul 2 07:53:15.991438 systemd[1]: Started session-2.scope. Jul 2 07:53:16.197870 sshd[1372]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:16.202225 systemd[1]: sshd@1-10.128.0.53:22-147.75.109.163:50384.service: Deactivated successfully. Jul 2 07:53:16.203413 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:53:16.204363 systemd-logind[1228]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:53:16.205934 systemd-logind[1228]: Removed session 2. Jul 2 07:53:16.244618 systemd[1]: Started sshd@2-10.128.0.53:22-147.75.109.163:50390.service. Jul 2 07:53:16.534420 sshd[1382]: Accepted publickey for core from 147.75.109.163 port 50390 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:16.536187 sshd[1382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:16.542136 systemd-logind[1228]: New session 3 of user core. Jul 2 07:53:16.542869 systemd[1]: Started session-3.scope. Jul 2 07:53:16.744138 sshd[1382]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:16.748498 systemd[1]: sshd@2-10.128.0.53:22-147.75.109.163:50390.service: Deactivated successfully. Jul 2 07:53:16.749545 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:53:16.750380 systemd-logind[1228]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:53:16.751644 systemd-logind[1228]: Removed session 3. Jul 2 07:53:16.790787 systemd[1]: Started sshd@3-10.128.0.53:22-147.75.109.163:50398.service. Jul 2 07:53:17.081600 sshd[1388]: Accepted publickey for core from 147.75.109.163 port 50398 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:17.083544 sshd[1388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:17.089535 systemd-logind[1228]: New session 4 of user core. Jul 2 07:53:17.090317 systemd[1]: Started session-4.scope. Jul 2 07:53:17.297140 sshd[1388]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:17.301145 systemd[1]: sshd@3-10.128.0.53:22-147.75.109.163:50398.service: Deactivated successfully. Jul 2 07:53:17.302240 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:53:17.303141 systemd-logind[1228]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:53:17.304642 systemd-logind[1228]: Removed session 4. Jul 2 07:53:17.344026 systemd[1]: Started sshd@4-10.128.0.53:22-147.75.109.163:50402.service. Jul 2 07:53:17.637500 sshd[1394]: Accepted publickey for core from 147.75.109.163 port 50402 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:17.639440 sshd[1394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:17.646702 systemd[1]: Started session-5.scope. Jul 2 07:53:17.647609 systemd-logind[1228]: New session 5 of user core. Jul 2 07:53:17.836899 sudo[1397]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:53:17.837382 sudo[1397]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:53:17.847286 dbus-daemon[1185]: Ѝ\xc0\xbb\u0013V: received setenforce notice (enforcing=1689503248) Jul 2 07:53:17.849453 sudo[1397]: pam_unix(sudo:session): session closed for user root Jul 2 07:53:17.894284 sshd[1394]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:17.899777 systemd[1]: sshd@4-10.128.0.53:22-147.75.109.163:50402.service: Deactivated successfully. Jul 2 07:53:17.900821 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:53:17.901685 systemd-logind[1228]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:53:17.902977 systemd-logind[1228]: Removed session 5. Jul 2 07:53:17.939745 systemd[1]: Started sshd@5-10.128.0.53:22-147.75.109.163:50408.service. Jul 2 07:53:18.226088 sshd[1401]: Accepted publickey for core from 147.75.109.163 port 50408 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:18.227708 sshd[1401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:18.234150 systemd-logind[1228]: New session 6 of user core. Jul 2 07:53:18.234896 systemd[1]: Started session-6.scope. Jul 2 07:53:18.403160 sudo[1405]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:53:18.403584 sudo[1405]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:53:18.407817 sudo[1405]: pam_unix(sudo:session): session closed for user root Jul 2 07:53:18.420395 sudo[1404]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:53:18.420817 sudo[1404]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:53:18.433901 systemd[1]: Stopping audit-rules.service... Jul 2 07:53:18.434000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:53:18.437291 auditctl[1408]: No rules Jul 2 07:53:18.441439 kernel: kauditd_printk_skb: 213 callbacks suppressed Jul 2 07:53:18.441519 kernel: audit: type=1305 audit(1719906798.434:196): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:53:18.441946 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:53:18.442205 systemd[1]: Stopped audit-rules.service. Jul 2 07:53:18.444967 systemd[1]: Starting audit-rules.service... Jul 2 07:53:18.434000 audit[1408]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff35311720 a2=420 a3=0 items=0 ppid=1 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:18.480459 augenrules[1425]: No rules Jul 2 07:53:18.481765 systemd[1]: Finished audit-rules.service. Jul 2 07:53:18.434000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:53:18.490653 sudo[1404]: pam_unix(sudo:session): session closed for user root Jul 2 07:53:18.497920 kernel: audit: type=1300 audit(1719906798.434:196): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff35311720 a2=420 a3=0 items=0 ppid=1 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:18.498008 kernel: audit: type=1327 audit(1719906798.434:196): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:53:18.498040 kernel: audit: type=1131 audit(1719906798.441:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.541551 kernel: audit: type=1130 audit(1719906798.481:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.541703 kernel: audit: type=1106 audit(1719906798.489:199): pid=1404 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.489000 audit[1404]: USER_END pid=1404 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.543379 sshd[1401]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:18.549581 systemd-logind[1228]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:53:18.552052 systemd[1]: sshd@5-10.128.0.53:22-147.75.109.163:50408.service: Deactivated successfully. Jul 2 07:53:18.553144 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:53:18.555174 systemd-logind[1228]: Removed session 6. Jul 2 07:53:18.489000 audit[1404]: CRED_DISP pid=1404 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.567102 kernel: audit: type=1104 audit(1719906798.489:200): pid=1404 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.588146 systemd[1]: Started sshd@6-10.128.0.53:22-147.75.109.163:50412.service. Jul 2 07:53:18.545000 audit[1401]: USER_END pid=1401 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:18.625543 kernel: audit: type=1106 audit(1719906798.545:201): pid=1401 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:18.625688 kernel: audit: type=1104 audit(1719906798.545:202): pid=1401 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:18.545000 audit[1401]: CRED_DISP pid=1401 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:18.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.53:22-147.75.109.163:50408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.53:22-147.75.109.163:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.674146 kernel: audit: type=1131 audit(1719906798.551:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.53:22-147.75.109.163:50408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:18.882000 audit[1431]: USER_ACCT pid=1431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:18.884637 sshd[1431]: Accepted publickey for core from 147.75.109.163 port 50412 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:53:18.884000 audit[1431]: CRED_ACQ pid=1431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:18.884000 audit[1431]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe13443e00 a2=3 a3=0 items=0 ppid=1 pid=1431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:18.884000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:53:18.886120 sshd[1431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:53:18.892823 systemd[1]: Started session-7.scope. Jul 2 07:53:18.893633 systemd-logind[1228]: New session 7 of user core. Jul 2 07:53:18.900000 audit[1431]: USER_START pid=1431 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:18.902000 audit[1433]: CRED_ACQ pid=1433 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:19.058000 audit[1434]: USER_ACCT pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.059905 sudo[1434]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:53:19.059000 audit[1434]: CRED_REFR pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.060404 sudo[1434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:53:19.062000 audit[1434]: USER_START pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.092701 systemd[1]: Starting docker.service... Jul 2 07:53:19.140048 env[1444]: time="2024-07-02T07:53:19.139023878Z" level=info msg="Starting up" Jul 2 07:53:19.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.143345 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:53:19.143628 systemd[1]: Stopped kubelet.service. Jul 2 07:53:19.143723 systemd[1]: kubelet.service: Consumed 1.408s CPU time. Jul 2 07:53:19.145954 systemd[1]: Starting kubelet.service... Jul 2 07:53:19.147992 env[1444]: time="2024-07-02T07:53:19.147953767Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:53:19.148168 env[1444]: time="2024-07-02T07:53:19.148134993Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:53:19.148310 env[1444]: time="2024-07-02T07:53:19.148282199Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:53:19.148448 env[1444]: time="2024-07-02T07:53:19.148412078Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:53:19.152290 env[1444]: time="2024-07-02T07:53:19.152256751Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:53:19.152437 env[1444]: time="2024-07-02T07:53:19.152398013Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:53:19.152564 env[1444]: time="2024-07-02T07:53:19.152539812Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:53:19.152669 env[1444]: time="2024-07-02T07:53:19.152643265Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:53:19.161929 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2303124014-merged.mount: Deactivated successfully. Jul 2 07:53:19.328883 env[1444]: time="2024-07-02T07:53:19.328828715Z" level=info msg="Loading containers: start." Jul 2 07:53:19.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.421998 systemd[1]: Started kubelet.service. Jul 2 07:53:19.430000 audit[1480]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.430000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffea6c56bc0 a2=0 a3=7ffea6c56bac items=0 ppid=1444 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.430000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:53:19.434000 audit[1487]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.434000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff81a54240 a2=0 a3=7fff81a5422c items=0 ppid=1444 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.434000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:53:19.438000 audit[1489]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.438000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc03b83f10 a2=0 a3=7ffc03b83efc items=0 ppid=1444 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:53:19.441000 audit[1491]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.441000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc8d4cd3d0 a2=0 a3=7ffc8d4cd3bc items=0 ppid=1444 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.441000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:53:19.446000 audit[1493]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.446000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffffa0f1ad0 a2=0 a3=7ffffa0f1abc items=0 ppid=1444 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.446000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:53:19.470000 audit[1498]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.470000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee7966b00 a2=0 a3=7ffee7966aec items=0 ppid=1444 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.470000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:53:19.482000 audit[1500]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.482000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc04451ae0 a2=0 a3=7ffc04451acc items=0 ppid=1444 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.482000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:53:19.486000 audit[1502]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.486000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc89b56e30 a2=0 a3=7ffc89b56e1c items=0 ppid=1444 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.486000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:53:19.489000 audit[1504]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.489000 audit[1504]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcadd4ede0 a2=0 a3=7ffcadd4edcc items=0 ppid=1444 pid=1504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:19.504000 audit[1508]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.504000 audit[1508]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc7dfb03c0 a2=0 a3=7ffc7dfb03ac items=0 ppid=1444 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.504000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:19.506000 audit[1509]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1509 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.506000 audit[1509]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdf66c90c0 a2=0 a3=7ffdf66c90ac items=0 ppid=1444 pid=1509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.506000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:19.523106 kubelet[1475]: E0702 07:53:19.523017 1475 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:53:19.528414 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:53:19.528618 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:53:19.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:53:19.530085 kernel: Initializing XFRM netlink socket Jul 2 07:53:19.575386 env[1444]: time="2024-07-02T07:53:19.575327007Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:53:19.605000 audit[1518]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.605000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffccc1e3240 a2=0 a3=7ffccc1e322c items=0 ppid=1444 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:53:19.616000 audit[1521]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1521 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.616000 audit[1521]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffed0817ba0 a2=0 a3=7ffed0817b8c items=0 ppid=1444 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.616000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:53:19.622000 audit[1524]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.622000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe7b6a9870 a2=0 a3=7ffe7b6a985c items=0 ppid=1444 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.622000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:53:19.623000 audit[1526]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.623000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc42137300 a2=0 a3=7ffc421372ec items=0 ppid=1444 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.623000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:53:19.626000 audit[1528]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.626000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffffded1840 a2=0 a3=7ffffded182c items=0 ppid=1444 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.626000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:53:19.629000 audit[1530]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.629000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff663e52a0 a2=0 a3=7fff663e528c items=0 ppid=1444 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.629000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:53:19.632000 audit[1532]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.632000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcf0e90050 a2=0 a3=7ffcf0e9003c items=0 ppid=1444 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:53:19.645000 audit[1535]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.645000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffeee6ee410 a2=0 a3=7ffeee6ee3fc items=0 ppid=1444 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.645000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:53:19.649000 audit[1537]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.649000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff86b90c90 a2=0 a3=7fff86b90c7c items=0 ppid=1444 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:53:19.652000 audit[1539]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.652000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdea9cd050 a2=0 a3=7ffdea9cd03c items=0 ppid=1444 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:53:19.656000 audit[1541]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.656000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe99a69410 a2=0 a3=7ffe99a693fc items=0 ppid=1444 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.656000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:53:19.656836 systemd-networkd[1021]: docker0: Link UP Jul 2 07:53:19.669000 audit[1545]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.669000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc63ee82e0 a2=0 a3=7ffc63ee82cc items=0 ppid=1444 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.669000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:19.670000 audit[1546]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:19.670000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe4ce469a0 a2=0 a3=7ffe4ce4698c items=0 ppid=1444 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:19.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:53:19.672293 env[1444]: time="2024-07-02T07:53:19.672243518Z" level=info msg="Loading containers: done." Jul 2 07:53:19.693232 env[1444]: time="2024-07-02T07:53:19.690107108Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:53:19.693232 env[1444]: time="2024-07-02T07:53:19.690387888Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:53:19.693232 env[1444]: time="2024-07-02T07:53:19.690781579Z" level=info msg="Daemon has completed initialization" Jul 2 07:53:19.713268 systemd[1]: Started docker.service. Jul 2 07:53:19.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:19.718496 env[1444]: time="2024-07-02T07:53:19.718419836Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:53:20.850381 env[1220]: time="2024-07-02T07:53:20.850310504Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\"" Jul 2 07:53:21.415270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount995817498.mount: Deactivated successfully. Jul 2 07:53:23.501312 env[1220]: time="2024-07-02T07:53:23.501237513Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:23.504125 env[1220]: time="2024-07-02T07:53:23.504053991Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3af2ab51e136465590d968a2052e02e180fc7967a03724b269c1337e8f09d36f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:23.506882 env[1220]: time="2024-07-02T07:53:23.506834616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:23.509465 env[1220]: time="2024-07-02T07:53:23.509426534Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f4d993b3d73cc0d59558be584b5b40785b4a96874bc76873b69d1dd818485e70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:23.510437 env[1220]: time="2024-07-02T07:53:23.510387368Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\" returns image reference \"sha256:3af2ab51e136465590d968a2052e02e180fc7967a03724b269c1337e8f09d36f\"" Jul 2 07:53:23.528104 env[1220]: time="2024-07-02T07:53:23.528036136Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\"" Jul 2 07:53:25.402231 env[1220]: time="2024-07-02T07:53:25.402154115Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:25.405459 env[1220]: time="2024-07-02T07:53:25.405407538Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:083b81fc09e858d3e0d4b42f567a9d44a2232b60bac396a94cbdd7ce1098235e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:25.408130 env[1220]: time="2024-07-02T07:53:25.408084843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:25.415588 env[1220]: time="2024-07-02T07:53:25.415525813Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\" returns image reference \"sha256:083b81fc09e858d3e0d4b42f567a9d44a2232b60bac396a94cbdd7ce1098235e\"" Jul 2 07:53:25.418311 env[1220]: time="2024-07-02T07:53:25.416871292Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:692fc3f88a60b3afc76492ad347306d34042000f56f230959e9367fd59c48b1e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:25.431231 env[1220]: time="2024-07-02T07:53:25.431171728Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\"" Jul 2 07:53:26.575363 env[1220]: time="2024-07-02T07:53:26.575295079Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:26.578177 env[1220]: time="2024-07-02T07:53:26.578129533Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:49d9b8328a8fda6ebca6b3226c6d722d92ec7adffff18668511a88058444cf15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:26.580631 env[1220]: time="2024-07-02T07:53:26.580588008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:26.582899 env[1220]: time="2024-07-02T07:53:26.582856362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b91a4e45debd0d5336d9f533aefdf47d4b39b24071feb459e521709b9e4ec24f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:26.584027 env[1220]: time="2024-07-02T07:53:26.583975514Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\" returns image reference \"sha256:49d9b8328a8fda6ebca6b3226c6d722d92ec7adffff18668511a88058444cf15\"" Jul 2 07:53:26.598052 env[1220]: time="2024-07-02T07:53:26.598001999Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\"" Jul 2 07:53:27.707935 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount253888217.mount: Deactivated successfully. Jul 2 07:53:28.386520 env[1220]: time="2024-07-02T07:53:28.386445002Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:28.389197 env[1220]: time="2024-07-02T07:53:28.389147921Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:28.391384 env[1220]: time="2024-07-02T07:53:28.391338763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:28.393585 env[1220]: time="2024-07-02T07:53:28.393531500Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:88bacb3e1d6c0c37c6da95c6d6b8e30531d0b4d0ab540cc290b0af51fbfebd90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:28.394286 env[1220]: time="2024-07-02T07:53:28.394243965Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\" returns image reference \"sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9\"" Jul 2 07:53:28.408201 env[1220]: time="2024-07-02T07:53:28.408152126Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 07:53:28.806923 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount653408763.mount: Deactivated successfully. Jul 2 07:53:29.593319 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 07:53:29.593638 systemd[1]: Stopped kubelet.service. Jul 2 07:53:29.623126 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 07:53:29.623270 kernel: audit: type=1130 audit(1719906809.592:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:29.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:29.622928 systemd[1]: Starting kubelet.service... Jul 2 07:53:29.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:29.659101 kernel: audit: type=1131 audit(1719906809.592:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:29.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:29.858706 systemd[1]: Started kubelet.service. Jul 2 07:53:29.881184 kernel: audit: type=1130 audit(1719906809.858:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:29.978695 kubelet[1609]: E0702 07:53:29.978630 1609 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:53:29.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:53:29.981225 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:53:29.981433 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:53:30.004130 kernel: audit: type=1131 audit(1719906809.980:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:53:30.121803 env[1220]: time="2024-07-02T07:53:30.121650916Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:30.125243 env[1220]: time="2024-07-02T07:53:30.125181234Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:30.128689 env[1220]: time="2024-07-02T07:53:30.128628943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:30.131445 env[1220]: time="2024-07-02T07:53:30.131377875Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:30.133181 env[1220]: time="2024-07-02T07:53:30.133129962Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Jul 2 07:53:30.147805 env[1220]: time="2024-07-02T07:53:30.147752879Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 07:53:30.502352 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3144052940.mount: Deactivated successfully. Jul 2 07:53:30.511901 env[1220]: time="2024-07-02T07:53:30.511817250Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:30.514307 env[1220]: time="2024-07-02T07:53:30.514250053Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:30.516628 env[1220]: time="2024-07-02T07:53:30.516584240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:30.518703 env[1220]: time="2024-07-02T07:53:30.518663834Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:30.519468 env[1220]: time="2024-07-02T07:53:30.519414872Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 07:53:30.533646 env[1220]: time="2024-07-02T07:53:30.533583524Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Jul 2 07:53:30.889181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1931080539.mount: Deactivated successfully. Jul 2 07:53:33.700389 env[1220]: time="2024-07-02T07:53:33.700309222Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:33.703370 env[1220]: time="2024-07-02T07:53:33.703319169Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:33.706053 env[1220]: time="2024-07-02T07:53:33.706010976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:33.708495 env[1220]: time="2024-07-02T07:53:33.708453792Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:33.709543 env[1220]: time="2024-07-02T07:53:33.709491586Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Jul 2 07:53:36.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:36.426516 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 07:53:36.451091 kernel: audit: type=1131 audit(1719906816.425:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:36.474000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:53:36.474000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:53:36.490054 kernel: audit: type=1334 audit(1719906816.474:247): prog-id=47 op=UNLOAD Jul 2 07:53:36.490192 kernel: audit: type=1334 audit(1719906816.474:248): prog-id=46 op=UNLOAD Jul 2 07:53:36.490236 kernel: audit: type=1334 audit(1719906816.474:249): prog-id=45 op=UNLOAD Jul 2 07:53:36.474000 audit: BPF prog-id=45 op=UNLOAD Jul 2 07:53:37.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:37.346583 systemd[1]: Stopped kubelet.service. Jul 2 07:53:37.369103 kernel: audit: type=1130 audit(1719906817.345:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:37.369630 systemd[1]: Starting kubelet.service... Jul 2 07:53:37.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:37.393117 kernel: audit: type=1131 audit(1719906817.345:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:37.414944 systemd[1]: Reloading. Jul 2 07:53:37.519685 /usr/lib/systemd/system-generators/torcx-generator[1716]: time="2024-07-02T07:53:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:37.520408 /usr/lib/systemd/system-generators/torcx-generator[1716]: time="2024-07-02T07:53:37Z" level=info msg="torcx already run" Jul 2 07:53:37.621816 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:37.621843 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:37.649418 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:37.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.811286 kernel: audit: type=1400 audit(1719906817.768:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.811423 kernel: audit: type=1400 audit(1719906817.768:253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.832453 kernel: audit: type=1400 audit(1719906817.768:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.859135 kernel: audit: type=1400 audit(1719906817.768:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit: BPF prog-id=49 op=LOAD Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.789000 audit: BPF prog-id=50 op=LOAD Jul 2 07:53:37.789000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:53:37.789000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit: BPF prog-id=51 op=LOAD Jul 2 07:53:37.810000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit: BPF prog-id=52 op=LOAD Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.831000 audit: BPF prog-id=53 op=LOAD Jul 2 07:53:37.831000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:53:37.831000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.855000 audit: BPF prog-id=54 op=LOAD Jul 2 07:53:37.855000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:53:37.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.860000 audit: BPF prog-id=58 op=LOAD Jul 2 07:53:37.860000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.861000 audit: BPF prog-id=59 op=LOAD Jul 2 07:53:37.861000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.863000 audit: BPF prog-id=60 op=LOAD Jul 2 07:53:37.863000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit: BPF prog-id=61 op=LOAD Jul 2 07:53:37.865000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit: BPF prog-id=62 op=LOAD Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:37.865000 audit: BPF prog-id=63 op=LOAD Jul 2 07:53:37.865000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:53:37.865000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:53:37.951850 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 2 07:53:37.951981 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 2 07:53:37.952605 systemd[1]: Stopped kubelet.service. Jul 2 07:53:37.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:53:37.955318 systemd[1]: Starting kubelet.service... Jul 2 07:53:38.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:38.803958 systemd[1]: Started kubelet.service. Jul 2 07:53:38.867824 kubelet[1761]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:53:38.868248 kubelet[1761]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:53:38.868248 kubelet[1761]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:53:38.868248 kubelet[1761]: I0702 07:53:38.868220 1761 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:53:39.135743 kubelet[1761]: I0702 07:53:39.135678 1761 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 07:53:39.135743 kubelet[1761]: I0702 07:53:39.135719 1761 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:53:39.136078 kubelet[1761]: I0702 07:53:39.136024 1761 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 07:53:39.172583 kubelet[1761]: E0702 07:53:39.172536 1761 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.53:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.174268 kubelet[1761]: I0702 07:53:39.174225 1761 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:53:39.201986 kubelet[1761]: I0702 07:53:39.201950 1761 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:53:39.202395 kubelet[1761]: I0702 07:53:39.202358 1761 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:53:39.202676 kubelet[1761]: I0702 07:53:39.202635 1761 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:53:39.203716 kubelet[1761]: I0702 07:53:39.203676 1761 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:53:39.203716 kubelet[1761]: I0702 07:53:39.203712 1761 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:53:39.203863 kubelet[1761]: I0702 07:53:39.203844 1761 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:53:39.204011 kubelet[1761]: I0702 07:53:39.203990 1761 kubelet.go:396] "Attempting to sync node with API server" Jul 2 07:53:39.204149 kubelet[1761]: I0702 07:53:39.204130 1761 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:53:39.204220 kubelet[1761]: I0702 07:53:39.204182 1761 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:53:39.204220 kubelet[1761]: I0702 07:53:39.204202 1761 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:53:39.208638 kubelet[1761]: I0702 07:53:39.208597 1761 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:53:39.219537 kubelet[1761]: W0702 07:53:39.219452 1761 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.128.0.53:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.219537 kubelet[1761]: E0702 07:53:39.219533 1761 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.53:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.219742 kubelet[1761]: W0702 07:53:39.219626 1761 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.128.0.53:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.219742 kubelet[1761]: E0702 07:53:39.219681 1761 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.53:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.221312 kubelet[1761]: I0702 07:53:39.221263 1761 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:53:39.221417 kubelet[1761]: W0702 07:53:39.221384 1761 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:53:39.222171 kubelet[1761]: I0702 07:53:39.222145 1761 server.go:1256] "Started kubelet" Jul 2 07:53:39.222373 kubelet[1761]: I0702 07:53:39.222332 1761 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:53:39.223952 kubelet[1761]: I0702 07:53:39.223311 1761 server.go:461] "Adding debug handlers to kubelet server" Jul 2 07:53:39.225000 audit[1761]: AVC avc: denied { mac_admin } for pid=1761 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:39.225000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:53:39.225000 audit[1761]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008be9f0 a1=c00073d9e0 a2=c0008be9c0 a3=25 items=0 ppid=1 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.225000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:53:39.225000 audit[1761]: AVC avc: denied { mac_admin } for pid=1761 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:39.225000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:53:39.225000 audit[1761]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007a4e40 a1=c00073d9f8 a2=c0008bea80 a3=25 items=0 ppid=1 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.225000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:53:39.227043 kubelet[1761]: I0702 07:53:39.226335 1761 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:53:39.227043 kubelet[1761]: I0702 07:53:39.226407 1761 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:53:39.227043 kubelet[1761]: I0702 07:53:39.226494 1761 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:53:39.228525 kubelet[1761]: I0702 07:53:39.228501 1761 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:53:39.228869 kubelet[1761]: I0702 07:53:39.228848 1761 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:53:39.230000 audit[1771]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:39.230000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5d85a120 a2=0 a3=7ffc5d85a10c items=0 ppid=1761 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:53:39.232000 audit[1772]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:39.232000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde2e61670 a2=0 a3=7ffde2e6165c items=0 ppid=1761 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:53:39.236299 kubelet[1761]: E0702 07:53:39.236270 1761 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.53:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.53:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal.17de5623be81963c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,UID:ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,},FirstTimestamp:2024-07-02 07:53:39.2221159 +0000 UTC m=+0.411922354,LastTimestamp:2024-07-02 07:53:39.2221159 +0000 UTC m=+0.411922354,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,}" Jul 2 07:53:39.238103 kubelet[1761]: I0702 07:53:39.237903 1761 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:53:39.238211 kubelet[1761]: I0702 07:53:39.238116 1761 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:53:39.238282 kubelet[1761]: I0702 07:53:39.238211 1761 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:53:39.238845 kubelet[1761]: W0702 07:53:39.238788 1761 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.128.0.53:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.238934 kubelet[1761]: E0702 07:53:39.238858 1761 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.53:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.239957 kubelet[1761]: E0702 07:53:39.239937 1761 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.53:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.53:6443: connect: connection refused" interval="200ms" Jul 2 07:53:39.240225 kubelet[1761]: E0702 07:53:39.240205 1761 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:53:39.240593 kubelet[1761]: I0702 07:53:39.240567 1761 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:53:39.240000 audit[1774]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:39.240000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffde6dc15b0 a2=0 a3=7ffde6dc159c items=0 ppid=1761 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:53:39.242572 kubelet[1761]: I0702 07:53:39.242537 1761 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:53:39.242572 kubelet[1761]: I0702 07:53:39.242559 1761 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:53:39.245000 audit[1776]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:39.245000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffefd993da0 a2=0 a3=7ffefd993d8c items=0 ppid=1761 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:53:39.259000 audit[1779]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:39.259000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd15f85ef0 a2=0 a3=7ffd15f85edc items=0 ppid=1761 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:53:39.261733 kubelet[1761]: I0702 07:53:39.261686 1761 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:53:39.262000 audit[1781]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:39.262000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc20904210 a2=0 a3=7ffc209041fc items=0 ppid=1761 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:53:39.264000 audit[1784]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:39.264000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1ed7d8b0 a2=0 a3=7ffc1ed7d89c items=0 ppid=1761 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:53:39.266197 kubelet[1761]: I0702 07:53:39.266083 1761 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:53:39.266197 kubelet[1761]: I0702 07:53:39.266121 1761 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:53:39.266197 kubelet[1761]: I0702 07:53:39.266149 1761 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 07:53:39.266394 kubelet[1761]: E0702 07:53:39.266226 1761 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:53:39.267603 kubelet[1761]: W0702 07:53:39.267306 1761 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.128.0.53:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.267603 kubelet[1761]: E0702 07:53:39.267372 1761 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.53:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:39.269000 audit[1787]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:39.269000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee50530f0 a2=0 a3=7ffee50530dc items=0 ppid=1761 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:53:39.272000 audit[1788]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:53:39.272000 audit[1785]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:39.272000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff300347a0 a2=0 a3=7fff3003478c items=0 ppid=1761 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:53:39.272000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd03321910 a2=0 a3=7ffd033218fc items=0 ppid=1761 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:53:39.275000 audit[1790]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:39.275000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffa1bebc60 a2=0 a3=7fffa1bebc4c items=0 ppid=1761 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:53:39.277000 audit[1791]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:53:39.277000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd7d0d9c40 a2=0 a3=7ffd7d0d9c2c items=0 ppid=1761 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:53:39.282663 kubelet[1761]: I0702 07:53:39.282625 1761 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:53:39.282663 kubelet[1761]: I0702 07:53:39.282652 1761 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:53:39.282826 kubelet[1761]: I0702 07:53:39.282677 1761 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:53:39.285622 kubelet[1761]: I0702 07:53:39.285589 1761 policy_none.go:49] "None policy: Start" Jul 2 07:53:39.287092 kubelet[1761]: I0702 07:53:39.287056 1761 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:53:39.287207 kubelet[1761]: I0702 07:53:39.287107 1761 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:53:39.294650 systemd[1]: Created slice kubepods.slice. Jul 2 07:53:39.301848 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:53:39.305830 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:53:39.316177 kubelet[1761]: I0702 07:53:39.316143 1761 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:53:39.315000 audit[1761]: AVC avc: denied { mac_admin } for pid=1761 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:39.315000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:53:39.315000 audit[1761]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e45da0 a1=c00029fa70 a2=c000e45d70 a3=25 items=0 ppid=1 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:39.315000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:53:39.316659 kubelet[1761]: I0702 07:53:39.316266 1761 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:53:39.316659 kubelet[1761]: I0702 07:53:39.316570 1761 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:53:39.319990 kubelet[1761]: E0702 07:53:39.319796 1761 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" not found" Jul 2 07:53:39.344469 kubelet[1761]: I0702 07:53:39.344432 1761 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.344892 kubelet[1761]: E0702 07:53:39.344866 1761 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.53:6443/api/v1/nodes\": dial tcp 10.128.0.53:6443: connect: connection refused" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.367177 kubelet[1761]: I0702 07:53:39.367113 1761 topology_manager.go:215] "Topology Admit Handler" podUID="fb15a06c2a26e1f4aa89c5112a8f6780" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.376813 kubelet[1761]: I0702 07:53:39.376774 1761 topology_manager.go:215] "Topology Admit Handler" podUID="334516da34c335c615d7ea2f145f26ef" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.382881 kubelet[1761]: I0702 07:53:39.382836 1761 topology_manager.go:215] "Topology Admit Handler" podUID="4eebd90a5e52a73b7fa250bd3eede7b7" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.390378 systemd[1]: Created slice kubepods-burstable-podfb15a06c2a26e1f4aa89c5112a8f6780.slice. Jul 2 07:53:39.405795 systemd[1]: Created slice kubepods-burstable-pod334516da34c335c615d7ea2f145f26ef.slice. Jul 2 07:53:39.412376 systemd[1]: Created slice kubepods-burstable-pod4eebd90a5e52a73b7fa250bd3eede7b7.slice. Jul 2 07:53:39.441500 kubelet[1761]: E0702 07:53:39.441440 1761 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.53:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.53:6443: connect: connection refused" interval="400ms" Jul 2 07:53:39.539823 kubelet[1761]: I0702 07:53:39.539767 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fb15a06c2a26e1f4aa89c5112a8f6780-kubeconfig\") pod \"kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"fb15a06c2a26e1f4aa89c5112a8f6780\") " pod="kube-system/kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.539823 kubelet[1761]: I0702 07:53:39.539832 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/334516da34c335c615d7ea2f145f26ef-ca-certs\") pod \"kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"334516da34c335c615d7ea2f145f26ef\") " pod="kube-system/kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.540057 kubelet[1761]: I0702 07:53:39.539869 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-ca-certs\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.540057 kubelet[1761]: I0702 07:53:39.539903 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.540057 kubelet[1761]: I0702 07:53:39.539936 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.540057 kubelet[1761]: I0702 07:53:39.539981 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.540363 kubelet[1761]: I0702 07:53:39.540020 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.540363 kubelet[1761]: I0702 07:53:39.540056 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/334516da34c335c615d7ea2f145f26ef-k8s-certs\") pod \"kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"334516da34c335c615d7ea2f145f26ef\") " pod="kube-system/kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.540363 kubelet[1761]: I0702 07:53:39.540132 1761 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/334516da34c335c615d7ea2f145f26ef-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"334516da34c335c615d7ea2f145f26ef\") " pod="kube-system/kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.550434 kubelet[1761]: I0702 07:53:39.550393 1761 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.550994 kubelet[1761]: E0702 07:53:39.550955 1761 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.53:6443/api/v1/nodes\": dial tcp 10.128.0.53:6443: connect: connection refused" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.703048 env[1220]: time="2024-07-02T07:53:39.702900731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,Uid:fb15a06c2a26e1f4aa89c5112a8f6780,Namespace:kube-system,Attempt:0,}" Jul 2 07:53:39.710821 env[1220]: time="2024-07-02T07:53:39.710768834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,Uid:334516da34c335c615d7ea2f145f26ef,Namespace:kube-system,Attempt:0,}" Jul 2 07:53:39.716239 env[1220]: time="2024-07-02T07:53:39.716190252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,Uid:4eebd90a5e52a73b7fa250bd3eede7b7,Namespace:kube-system,Attempt:0,}" Jul 2 07:53:39.842011 kubelet[1761]: E0702 07:53:39.841951 1761 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.53:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.53:6443: connect: connection refused" interval="800ms" Jul 2 07:53:39.957647 kubelet[1761]: I0702 07:53:39.957233 1761 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:39.958179 kubelet[1761]: E0702 07:53:39.957872 1761 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.53:6443/api/v1/nodes\": dial tcp 10.128.0.53:6443: connect: connection refused" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:40.060026 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1769731558.mount: Deactivated successfully. Jul 2 07:53:40.071735 env[1220]: time="2024-07-02T07:53:40.071672721Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.073203 env[1220]: time="2024-07-02T07:53:40.073131287Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.076763 env[1220]: time="2024-07-02T07:53:40.076717859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.078606 env[1220]: time="2024-07-02T07:53:40.078539604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.079765 env[1220]: time="2024-07-02T07:53:40.079705879Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.082515 env[1220]: time="2024-07-02T07:53:40.082454334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.083673 env[1220]: time="2024-07-02T07:53:40.083625479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.084602 env[1220]: time="2024-07-02T07:53:40.084567335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.086872 env[1220]: time="2024-07-02T07:53:40.086828245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.087790 env[1220]: time="2024-07-02T07:53:40.087740238Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.096776 env[1220]: time="2024-07-02T07:53:40.096627794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.105105 env[1220]: time="2024-07-02T07:53:40.105042383Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:53:40.149887 env[1220]: time="2024-07-02T07:53:40.149806434Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:40.150155 env[1220]: time="2024-07-02T07:53:40.150110058Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:40.150325 env[1220]: time="2024-07-02T07:53:40.150289109Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:40.150660 env[1220]: time="2024-07-02T07:53:40.150614943Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4054e3dfdd62e6b244ffac8e31c57965c82286d25b8f5eb0b19bacb6f0ae9b0 pid=1799 runtime=io.containerd.runc.v2 Jul 2 07:53:40.173574 env[1220]: time="2024-07-02T07:53:40.173465129Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:40.173899 env[1220]: time="2024-07-02T07:53:40.173851104Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:40.174052 env[1220]: time="2024-07-02T07:53:40.174019219Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:40.174482 env[1220]: time="2024-07-02T07:53:40.174427561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19b422fb16b4912dc40930d952d2215f45626025b0034e2288ac0367d239c8fc pid=1820 runtime=io.containerd.runc.v2 Jul 2 07:53:40.174993 env[1220]: time="2024-07-02T07:53:40.174923718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:53:40.175220 env[1220]: time="2024-07-02T07:53:40.175172088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:53:40.175423 env[1220]: time="2024-07-02T07:53:40.175375133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:53:40.175790 env[1220]: time="2024-07-02T07:53:40.175740371Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27f4ca4174e7dacc3ac5e941511173fb1e3b6fd7ad445d8d383947e38f69bf31 pid=1829 runtime=io.containerd.runc.v2 Jul 2 07:53:40.190859 systemd[1]: Started cri-containerd-f4054e3dfdd62e6b244ffac8e31c57965c82286d25b8f5eb0b19bacb6f0ae9b0.scope. Jul 2 07:53:40.223296 systemd[1]: Started cri-containerd-19b422fb16b4912dc40930d952d2215f45626025b0034e2288ac0367d239c8fc.scope. Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.234000 audit: BPF prog-id=64 op=LOAD Jul 2 07:53:40.235000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.235000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1799 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634303534653364666464363265366232343466666163386533316335 Jul 2 07:53:40.235000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.235000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1799 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634303534653364666464363265366232343466666163386533316335 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit: BPF prog-id=65 op=LOAD Jul 2 07:53:40.237000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000350370 items=0 ppid=1799 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634303534653364666464363265366232343466666163386533316335 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.237000 audit: BPF prog-id=66 op=LOAD Jul 2 07:53:40.237000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003503b8 items=0 ppid=1799 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634303534653364666464363265366232343466666163386533316335 Jul 2 07:53:40.237000 audit: BPF prog-id=66 op=UNLOAD Jul 2 07:53:40.238000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.238000 audit: BPF prog-id=67 op=LOAD Jul 2 07:53:40.238000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003507c8 items=0 ppid=1799 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634303534653364666464363265366232343466666163386533316335 Jul 2 07:53:40.242937 systemd[1]: Started cri-containerd-27f4ca4174e7dacc3ac5e941511173fb1e3b6fd7ad445d8d383947e38f69bf31.scope. Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.264000 audit: BPF prog-id=68 op=LOAD Jul 2 07:53:40.266000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.266000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cfc48 a2=10 a3=1c items=0 ppid=1820 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623432326662313662343931326463343039333064393532643232 Jul 2 07:53:40.266000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.266000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cf6b0 a2=3c a3=c items=0 ppid=1820 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623432326662313662343931326463343039333064393532643232 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.267000 audit: BPF prog-id=69 op=LOAD Jul 2 07:53:40.267000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cf9d8 a2=78 a3=c0003782c0 items=0 ppid=1820 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623432326662313662343931326463343039333064393532643232 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.269000 audit: BPF prog-id=70 op=LOAD Jul 2 07:53:40.269000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cf770 a2=78 a3=c000378308 items=0 ppid=1820 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623432326662313662343931326463343039333064393532643232 Jul 2 07:53:40.271000 audit: BPF prog-id=70 op=UNLOAD Jul 2 07:53:40.271000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.271000 audit: BPF prog-id=71 op=LOAD Jul 2 07:53:40.271000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cfc30 a2=78 a3=c000378718 items=0 ppid=1820 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623432326662313662343931326463343039333064393532643232 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.282000 audit: BPF prog-id=72 op=LOAD Jul 2 07:53:40.285000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.285000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1829 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663463613431373465376461636333616335653934313531313137 Jul 2 07:53:40.285000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.285000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1829 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663463613431373465376461636333616335653934313531313137 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.286000 audit: BPF prog-id=73 op=LOAD Jul 2 07:53:40.286000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028f290 items=0 ppid=1829 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663463613431373465376461636333616335653934313531313137 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.287000 audit: BPF prog-id=74 op=LOAD Jul 2 07:53:40.287000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028f2d8 items=0 ppid=1829 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663463613431373465376461636333616335653934313531313137 Jul 2 07:53:40.288000 audit: BPF prog-id=74 op=UNLOAD Jul 2 07:53:40.288000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.288000 audit: BPF prog-id=75 op=LOAD Jul 2 07:53:40.288000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028f6e8 items=0 ppid=1829 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663463613431373465376461636333616335653934313531313137 Jul 2 07:53:40.326094 env[1220]: time="2024-07-02T07:53:40.326022565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,Uid:fb15a06c2a26e1f4aa89c5112a8f6780,Namespace:kube-system,Attempt:0,} returns sandbox id \"f4054e3dfdd62e6b244ffac8e31c57965c82286d25b8f5eb0b19bacb6f0ae9b0\"" Jul 2 07:53:40.330849 kubelet[1761]: E0702 07:53:40.330797 1761 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-21291" Jul 2 07:53:40.335745 env[1220]: time="2024-07-02T07:53:40.335688758Z" level=info msg="CreateContainer within sandbox \"f4054e3dfdd62e6b244ffac8e31c57965c82286d25b8f5eb0b19bacb6f0ae9b0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 07:53:40.354721 kubelet[1761]: W0702 07:53:40.354647 1761 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.128.0.53:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:40.354971 kubelet[1761]: E0702 07:53:40.354730 1761 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.53:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:40.363565 env[1220]: time="2024-07-02T07:53:40.363482601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,Uid:4eebd90a5e52a73b7fa250bd3eede7b7,Namespace:kube-system,Attempt:0,} returns sandbox id \"27f4ca4174e7dacc3ac5e941511173fb1e3b6fd7ad445d8d383947e38f69bf31\"" Jul 2 07:53:40.366288 env[1220]: time="2024-07-02T07:53:40.366217231Z" level=info msg="CreateContainer within sandbox \"f4054e3dfdd62e6b244ffac8e31c57965c82286d25b8f5eb0b19bacb6f0ae9b0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c23d5b8cb1494acc3b20423ba7f8efd0b33e8d7a2d7c8afb7a217e09fb782b37\"" Jul 2 07:53:40.367473 env[1220]: time="2024-07-02T07:53:40.367430956Z" level=info msg="StartContainer for \"c23d5b8cb1494acc3b20423ba7f8efd0b33e8d7a2d7c8afb7a217e09fb782b37\"" Jul 2 07:53:40.368014 kubelet[1761]: E0702 07:53:40.367973 1761 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flat" Jul 2 07:53:40.371768 env[1220]: time="2024-07-02T07:53:40.371721087Z" level=info msg="CreateContainer within sandbox \"27f4ca4174e7dacc3ac5e941511173fb1e3b6fd7ad445d8d383947e38f69bf31\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 07:53:40.380289 kubelet[1761]: W0702 07:53:40.380183 1761 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.128.0.53:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:40.380468 kubelet[1761]: E0702 07:53:40.380320 1761 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.53:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:40.394703 env[1220]: time="2024-07-02T07:53:40.394625400Z" level=info msg="CreateContainer within sandbox \"27f4ca4174e7dacc3ac5e941511173fb1e3b6fd7ad445d8d383947e38f69bf31\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6b48edba585384465f9622acbb3a80e3caba44b0176e902c1e12c8d4ff1c4db7\"" Jul 2 07:53:40.395375 env[1220]: time="2024-07-02T07:53:40.395302192Z" level=info msg="StartContainer for \"6b48edba585384465f9622acbb3a80e3caba44b0176e902c1e12c8d4ff1c4db7\"" Jul 2 07:53:40.396625 env[1220]: time="2024-07-02T07:53:40.396581678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal,Uid:334516da34c335c615d7ea2f145f26ef,Namespace:kube-system,Attempt:0,} returns sandbox id \"19b422fb16b4912dc40930d952d2215f45626025b0034e2288ac0367d239c8fc\"" Jul 2 07:53:40.398555 kubelet[1761]: E0702 07:53:40.398099 1761 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-21291" Jul 2 07:53:40.401701 env[1220]: time="2024-07-02T07:53:40.401655681Z" level=info msg="CreateContainer within sandbox \"19b422fb16b4912dc40930d952d2215f45626025b0034e2288ac0367d239c8fc\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 07:53:40.412995 systemd[1]: Started cri-containerd-c23d5b8cb1494acc3b20423ba7f8efd0b33e8d7a2d7c8afb7a217e09fb782b37.scope. Jul 2 07:53:40.438167 env[1220]: time="2024-07-02T07:53:40.438047871Z" level=info msg="CreateContainer within sandbox \"19b422fb16b4912dc40930d952d2215f45626025b0034e2288ac0367d239c8fc\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"4f0566745c172760a61cfa55075b195b53e0647f5874a761e6f0a8a375260874\"" Jul 2 07:53:40.439083 env[1220]: time="2024-07-02T07:53:40.439014238Z" level=info msg="StartContainer for \"4f0566745c172760a61cfa55075b195b53e0647f5874a761e6f0a8a375260874\"" Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.450000 audit: BPF prog-id=76 op=LOAD Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1799 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336435623863623134393461636333623230343233626137663865 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1799 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336435623863623134393461636333623230343233626137663865 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit: BPF prog-id=77 op=LOAD Jul 2 07:53:40.452000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000285be0 items=0 ppid=1799 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336435623863623134393461636333623230343233626137663865 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit: BPF prog-id=78 op=LOAD Jul 2 07:53:40.452000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000285c28 items=0 ppid=1799 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336435623863623134393461636333623230343233626137663865 Jul 2 07:53:40.452000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:53:40.452000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.452000 audit: BPF prog-id=79 op=LOAD Jul 2 07:53:40.452000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002fe038 items=0 ppid=1799 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336435623863623134393461636333623230343233626137663865 Jul 2 07:53:40.460639 systemd[1]: Started cri-containerd-6b48edba585384465f9622acbb3a80e3caba44b0176e902c1e12c8d4ff1c4db7.scope. Jul 2 07:53:40.501347 systemd[1]: Started cri-containerd-4f0566745c172760a61cfa55075b195b53e0647f5874a761e6f0a8a375260874.scope. Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.518000 audit: BPF prog-id=80 op=LOAD Jul 2 07:53:40.519000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.519000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1829 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343865646261353835333834343635663936323261636262336138 Jul 2 07:53:40.519000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.519000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1829 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343865646261353835333834343635663936323261636262336138 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.520000 audit: BPF prog-id=81 op=LOAD Jul 2 07:53:40.520000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000380500 items=0 ppid=1829 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343865646261353835333834343635663936323261636262336138 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.521000 audit: BPF prog-id=82 op=LOAD Jul 2 07:53:40.521000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000380548 items=0 ppid=1829 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343865646261353835333834343635663936323261636262336138 Jul 2 07:53:40.531000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:53:40.531000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:53:40.533850 kubelet[1761]: W0702 07:53:40.533709 1761 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.128.0.53:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:40.533850 kubelet[1761]: E0702 07:53:40.533801 1761 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.53:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.533000 audit: BPF prog-id=83 op=LOAD Jul 2 07:53:40.533000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000380958 items=0 ppid=1829 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343865646261353835333834343635663936323261636262336138 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.547000 audit: BPF prog-id=84 op=LOAD Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1820 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303536363734356331373237363061363163666135353037356231 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1820 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303536363734356331373237363061363163666135353037356231 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.549000 audit: BPF prog-id=85 op=LOAD Jul 2 07:53:40.549000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ec300 items=0 ppid=1820 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303536363734356331373237363061363163666135353037356231 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.553000 audit: BPF prog-id=86 op=LOAD Jul 2 07:53:40.553000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ec348 items=0 ppid=1820 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303536363734356331373237363061363163666135353037356231 Jul 2 07:53:40.554000 audit: BPF prog-id=86 op=UNLOAD Jul 2 07:53:40.554000 audit: BPF prog-id=85 op=UNLOAD Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:40.554000 audit: BPF prog-id=87 op=LOAD Jul 2 07:53:40.554000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ec758 items=0 ppid=1820 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:40.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303536363734356331373237363061363163666135353037356231 Jul 2 07:53:40.561603 env[1220]: time="2024-07-02T07:53:40.561549954Z" level=info msg="StartContainer for \"c23d5b8cb1494acc3b20423ba7f8efd0b33e8d7a2d7c8afb7a217e09fb782b37\" returns successfully" Jul 2 07:53:40.623603 env[1220]: time="2024-07-02T07:53:40.623544942Z" level=info msg="StartContainer for \"4f0566745c172760a61cfa55075b195b53e0647f5874a761e6f0a8a375260874\" returns successfully" Jul 2 07:53:40.639424 env[1220]: time="2024-07-02T07:53:40.639363608Z" level=info msg="StartContainer for \"6b48edba585384465f9622acbb3a80e3caba44b0176e902c1e12c8d4ff1c4db7\" returns successfully" Jul 2 07:53:40.642719 kubelet[1761]: E0702 07:53:40.642658 1761 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.53:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.53:6443: connect: connection refused" interval="1.6s" Jul 2 07:53:40.764721 kubelet[1761]: I0702 07:53:40.764186 1761 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:40.764721 kubelet[1761]: E0702 07:53:40.764601 1761 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.53:6443/api/v1/nodes\": dial tcp 10.128.0.53:6443: connect: connection refused" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:42.369947 kubelet[1761]: I0702 07:53:42.369915 1761 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:43.021000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:43.027963 kernel: kauditd_printk_skb: 624 callbacks suppressed Jul 2 07:53:43.028134 kernel: audit: type=1400 audit(1719906823.021:517): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:43.021000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000864000 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:53:43.090092 kernel: audit: type=1300 audit(1719906823.021:517): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000864000 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:53:43.090268 kernel: audit: type=1327 audit(1719906823.021:517): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:43.021000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:43.021000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:43.144420 kernel: audit: type=1400 audit(1719906823.021:518): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:43.144591 kernel: audit: type=1300 audit(1719906823.021:518): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003365c0 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:53:43.021000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003365c0 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:53:43.021000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:43.207594 kernel: audit: type=1327 audit(1719906823.021:518): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:44.183000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:44.212088 kernel: audit: type=1400 audit(1719906824.183:519): avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:44.185000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8246 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:44.249091 kernel: audit: type=1400 audit(1719906824.185:520): avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8246 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:44.185000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006314540 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:53:44.302199 kernel: audit: type=1300 audit(1719906824.185:520): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006314540 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:53:44.185000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:53:44.343095 kernel: audit: type=1327 audit(1719906824.185:520): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:53:44.183000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00682a090 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:53:44.183000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:53:44.211000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:44.211000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00314baa0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:53:44.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:53:44.216000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:44.216000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c00682a2d0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:53:44.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:53:44.351000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:44.351000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0038b04e0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:53:44.351000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:53:44.352000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:53:44.352000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c006a491d0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:53:44.352000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:53:44.380044 kubelet[1761]: E0702 07:53:44.379970 1761 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" not found" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:44.399650 kubelet[1761]: I0702 07:53:44.399602 1761 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:45.211996 kubelet[1761]: I0702 07:53:45.211932 1761 apiserver.go:52] "Watching apiserver" Jul 2 07:53:45.238815 kubelet[1761]: I0702 07:53:45.238761 1761 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:53:46.140161 kubelet[1761]: W0702 07:53:46.140120 1761 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:53:46.954931 systemd[1]: Reloading. Jul 2 07:53:47.085121 /usr/lib/systemd/system-generators/torcx-generator[2055]: time="2024-07-02T07:53:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:53:47.085168 /usr/lib/systemd/system-generators/torcx-generator[2055]: time="2024-07-02T07:53:47Z" level=info msg="torcx already run" Jul 2 07:53:47.170826 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:53:47.170854 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:53:47.197986 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.311000 audit: BPF prog-id=88 op=LOAD Jul 2 07:53:47.311000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.317000 audit: BPF prog-id=89 op=LOAD Jul 2 07:53:47.317000 audit: BPF prog-id=76 op=UNLOAD Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit: BPF prog-id=90 op=LOAD Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.318000 audit: BPF prog-id=91 op=LOAD Jul 2 07:53:47.318000 audit: BPF prog-id=49 op=UNLOAD Jul 2 07:53:47.318000 audit: BPF prog-id=50 op=UNLOAD Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit: BPF prog-id=92 op=LOAD Jul 2 07:53:47.320000 audit: BPF prog-id=51 op=UNLOAD Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit: BPF prog-id=93 op=LOAD Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.321000 audit: BPF prog-id=94 op=LOAD Jul 2 07:53:47.321000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:53:47.321000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.323000 audit: BPF prog-id=95 op=LOAD Jul 2 07:53:47.323000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.326000 audit: BPF prog-id=96 op=LOAD Jul 2 07:53:47.326000 audit: BPF prog-id=84 op=UNLOAD Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.328000 audit: BPF prog-id=97 op=LOAD Jul 2 07:53:47.328000 audit: BPF prog-id=54 op=UNLOAD Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.329000 audit: BPF prog-id=98 op=LOAD Jul 2 07:53:47.329000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit: BPF prog-id=99 op=LOAD Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.330000 audit: BPF prog-id=100 op=LOAD Jul 2 07:53:47.330000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:53:47.330000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.331000 audit: BPF prog-id=101 op=LOAD Jul 2 07:53:47.331000 audit: BPF prog-id=72 op=UNLOAD Jul 2 07:53:47.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.336000 audit: BPF prog-id=102 op=LOAD Jul 2 07:53:47.336000 audit: BPF prog-id=68 op=UNLOAD Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit: BPF prog-id=103 op=LOAD Jul 2 07:53:47.338000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.339000 audit: BPF prog-id=104 op=LOAD Jul 2 07:53:47.339000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:53:47.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.340000 audit: BPF prog-id=105 op=LOAD Jul 2 07:53:47.340000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit: BPF prog-id=106 op=LOAD Jul 2 07:53:47.342000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit: BPF prog-id=107 op=LOAD Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.343000 audit: BPF prog-id=108 op=LOAD Jul 2 07:53:47.343000 audit: BPF prog-id=62 op=UNLOAD Jul 2 07:53:47.343000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:53:47.365965 kubelet[1761]: I0702 07:53:47.365911 1761 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:53:47.368268 systemd[1]: Stopping kubelet.service... Jul 2 07:53:47.387544 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:53:47.387822 systemd[1]: Stopped kubelet.service. Jul 2 07:53:47.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:47.390848 systemd[1]: Starting kubelet.service... Jul 2 07:53:47.606300 systemd[1]: Started kubelet.service. Jul 2 07:53:47.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:47.717561 kubelet[2103]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:53:47.717561 kubelet[2103]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:53:47.717561 kubelet[2103]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:53:47.717561 kubelet[2103]: I0702 07:53:47.717177 2103 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:53:47.724735 kubelet[2103]: I0702 07:53:47.724686 2103 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 07:53:47.724735 kubelet[2103]: I0702 07:53:47.724718 2103 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:53:47.726034 kubelet[2103]: I0702 07:53:47.725140 2103 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 07:53:47.727967 kubelet[2103]: I0702 07:53:47.727457 2103 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 07:53:47.730440 kubelet[2103]: I0702 07:53:47.730408 2103 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:53:47.743036 kubelet[2103]: I0702 07:53:47.742964 2103 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:53:47.743430 kubelet[2103]: I0702 07:53:47.743389 2103 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:53:47.744797 kubelet[2103]: I0702 07:53:47.743662 2103 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:53:47.744797 kubelet[2103]: I0702 07:53:47.743703 2103 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:53:47.744797 kubelet[2103]: I0702 07:53:47.743722 2103 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:53:47.744797 kubelet[2103]: I0702 07:53:47.743793 2103 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:53:47.744797 kubelet[2103]: I0702 07:53:47.743917 2103 kubelet.go:396] "Attempting to sync node with API server" Jul 2 07:53:47.744797 kubelet[2103]: I0702 07:53:47.743935 2103 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:53:47.744797 kubelet[2103]: I0702 07:53:47.743971 2103 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:53:47.745335 kubelet[2103]: I0702 07:53:47.743993 2103 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:53:47.768902 kubelet[2103]: I0702 07:53:47.768869 2103 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:53:47.769379 kubelet[2103]: I0702 07:53:47.769359 2103 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:53:47.772129 kubelet[2103]: I0702 07:53:47.772104 2103 server.go:1256] "Started kubelet" Jul 2 07:53:47.777000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.777000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:53:47.777000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c793e0 a1=c000c57ab8 a2=c000c793b0 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:47.777000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:53:47.778975 kubelet[2103]: I0702 07:53:47.778956 2103 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:53:47.778000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.778000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:53:47.778000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bcf180 a1=c000c57ad0 a2=c000c79470 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:47.778000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:53:47.780513 kubelet[2103]: I0702 07:53:47.780492 2103 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:53:47.781672 kubelet[2103]: I0702 07:53:47.781655 2103 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:53:47.787277 kubelet[2103]: I0702 07:53:47.787253 2103 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:53:47.793447 kubelet[2103]: I0702 07:53:47.793419 2103 server.go:461] "Adding debug handlers to kubelet server" Jul 2 07:53:47.813527 kubelet[2103]: I0702 07:53:47.793604 2103 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:53:47.813527 kubelet[2103]: I0702 07:53:47.813316 2103 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:53:47.813527 kubelet[2103]: I0702 07:53:47.796363 2103 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:53:47.815404 kubelet[2103]: I0702 07:53:47.814984 2103 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:53:47.815404 kubelet[2103]: I0702 07:53:47.815140 2103 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:53:47.815734 kubelet[2103]: I0702 07:53:47.796384 2103 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:53:47.815933 kubelet[2103]: I0702 07:53:47.815914 2103 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:53:47.826158 kubelet[2103]: I0702 07:53:47.825042 2103 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:53:47.882560 kubelet[2103]: I0702 07:53:47.878437 2103 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:53:47.889492 kubelet[2103]: I0702 07:53:47.889405 2103 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:53:47.889638 kubelet[2103]: I0702 07:53:47.889501 2103 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:53:47.889638 kubelet[2103]: I0702 07:53:47.889530 2103 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 07:53:47.889638 kubelet[2103]: E0702 07:53:47.889617 2103 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:53:47.938235 kubelet[2103]: I0702 07:53:47.938196 2103 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:47.943906 kubelet[2103]: I0702 07:53:47.943876 2103 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:53:47.945350 kubelet[2103]: I0702 07:53:47.945328 2103 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:53:47.945497 kubelet[2103]: I0702 07:53:47.945481 2103 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:53:47.945932 kubelet[2103]: I0702 07:53:47.945912 2103 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 07:53:47.947355 kubelet[2103]: I0702 07:53:47.947335 2103 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 07:53:47.947465 kubelet[2103]: I0702 07:53:47.947452 2103 policy_none.go:49] "None policy: Start" Jul 2 07:53:47.952130 kubelet[2103]: I0702 07:53:47.952104 2103 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:47.953179 kubelet[2103]: I0702 07:53:47.953150 2103 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:47.955109 kubelet[2103]: I0702 07:53:47.955086 2103 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:53:47.955254 kubelet[2103]: I0702 07:53:47.955238 2103 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:53:47.955680 kubelet[2103]: I0702 07:53:47.955656 2103 state_mem.go:75] "Updated machine memory state" Jul 2 07:53:47.970944 kubelet[2103]: I0702 07:53:47.970914 2103 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:53:47.974000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:53:47.974000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:53:47.974000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000626bd0 a1=c000d5e258 a2=c000626b70 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:53:47.974000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:53:47.975588 kubelet[2103]: I0702 07:53:47.975219 2103 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:53:47.975588 kubelet[2103]: I0702 07:53:47.975536 2103 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:53:47.989971 kubelet[2103]: I0702 07:53:47.989891 2103 topology_manager.go:215] "Topology Admit Handler" podUID="334516da34c335c615d7ea2f145f26ef" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:47.992151 kubelet[2103]: I0702 07:53:47.990104 2103 topology_manager.go:215] "Topology Admit Handler" podUID="4eebd90a5e52a73b7fa250bd3eede7b7" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:47.992151 kubelet[2103]: I0702 07:53:47.990173 2103 topology_manager.go:215] "Topology Admit Handler" podUID="fb15a06c2a26e1f4aa89c5112a8f6780" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.008667 kubelet[2103]: W0702 07:53:48.008634 2103 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:53:48.011263 kubelet[2103]: E0702 07:53:48.009053 2103 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.011263 kubelet[2103]: W0702 07:53:48.008890 2103 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:53:48.011263 kubelet[2103]: W0702 07:53:48.008957 2103 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:53:48.023166 kubelet[2103]: I0702 07:53:48.022491 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.023166 kubelet[2103]: I0702 07:53:48.022565 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/334516da34c335c615d7ea2f145f26ef-ca-certs\") pod \"kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"334516da34c335c615d7ea2f145f26ef\") " pod="kube-system/kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.023166 kubelet[2103]: I0702 07:53:48.022612 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/334516da34c335c615d7ea2f145f26ef-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"334516da34c335c615d7ea2f145f26ef\") " pod="kube-system/kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.023166 kubelet[2103]: I0702 07:53:48.022655 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.023461 kubelet[2103]: I0702 07:53:48.022730 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.023461 kubelet[2103]: I0702 07:53:48.022774 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.023461 kubelet[2103]: I0702 07:53:48.022815 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fb15a06c2a26e1f4aa89c5112a8f6780-kubeconfig\") pod \"kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"fb15a06c2a26e1f4aa89c5112a8f6780\") " pod="kube-system/kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.023461 kubelet[2103]: I0702 07:53:48.022855 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/334516da34c335c615d7ea2f145f26ef-k8s-certs\") pod \"kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"334516da34c335c615d7ea2f145f26ef\") " pod="kube-system/kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.023590 kubelet[2103]: I0702 07:53:48.022896 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4eebd90a5e52a73b7fa250bd3eede7b7-ca-certs\") pod \"kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" (UID: \"4eebd90a5e52a73b7fa250bd3eede7b7\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:48.766127 kubelet[2103]: I0702 07:53:48.766038 2103 apiserver.go:52] "Watching apiserver" Jul 2 07:53:48.816122 kubelet[2103]: I0702 07:53:48.816079 2103 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:53:48.978654 kubelet[2103]: W0702 07:53:48.978606 2103 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:53:48.978840 kubelet[2103]: E0702 07:53:48.978818 2103 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:53:49.008168 kubelet[2103]: I0702 07:53:49.008121 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" podStartSLOduration=2.008024334 podStartE2EDuration="2.008024334s" podCreationTimestamp="2024-07-02 07:53:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:53:49.007617737 +0000 UTC m=+1.391313223" watchObservedRunningTime="2024-07-02 07:53:49.008024334 +0000 UTC m=+1.391719815" Jul 2 07:53:49.008420 kubelet[2103]: I0702 07:53:49.008294 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" podStartSLOduration=3.008262597 podStartE2EDuration="3.008262597s" podCreationTimestamp="2024-07-02 07:53:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:53:48.936855715 +0000 UTC m=+1.320551199" watchObservedRunningTime="2024-07-02 07:53:49.008262597 +0000 UTC m=+1.391958088" Jul 2 07:53:49.071441 kubelet[2103]: I0702 07:53:49.071297 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" podStartSLOduration=1.07122552 podStartE2EDuration="1.07122552s" podCreationTimestamp="2024-07-02 07:53:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:53:49.038725538 +0000 UTC m=+1.422421021" watchObservedRunningTime="2024-07-02 07:53:49.07122552 +0000 UTC m=+1.454921008" Jul 2 07:53:51.338221 update_engine[1207]: I0702 07:53:51.338150 1207 update_attempter.cc:509] Updating boot flags... Jul 2 07:53:53.283601 sudo[1434]: pam_unix(sudo:session): session closed for user root Jul 2 07:53:53.284000 audit[1434]: USER_END pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.289666 kernel: kauditd_printk_skb: 272 callbacks suppressed Jul 2 07:53:53.289805 kernel: audit: type=1106 audit(1719906833.284:774): pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.284000 audit[1434]: CRED_DISP pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.337834 kernel: audit: type=1104 audit(1719906833.284:775): pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.339826 sshd[1431]: pam_unix(sshd:session): session closed for user core Jul 2 07:53:53.341000 audit[1431]: USER_END pid=1431 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:53.345510 systemd[1]: sshd@6-10.128.0.53:22-147.75.109.163:50412.service: Deactivated successfully. Jul 2 07:53:53.346588 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:53:53.346765 systemd[1]: session-7.scope: Consumed 6.219s CPU time. Jul 2 07:53:53.348894 systemd-logind[1228]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:53:53.350490 systemd-logind[1228]: Removed session 7. Jul 2 07:53:53.341000 audit[1431]: CRED_DISP pid=1431 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:53.398806 kernel: audit: type=1106 audit(1719906833.341:776): pid=1431 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:53.398967 kernel: audit: type=1104 audit(1719906833.341:777): pid=1431 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:53:53.399018 kernel: audit: type=1131 audit(1719906833.341:778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.53:22-147.75.109.163:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:53.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.53:22-147.75.109.163:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:53:59.628000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:53:59.628000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000915940 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:53:59.690885 kernel: audit: type=1400 audit(1719906839.628:779): avc: denied { watch } for pid=1978 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:53:59.691055 kernel: audit: type=1300 audit(1719906839.628:779): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000915940 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:53:59.691122 kernel: audit: type=1327 audit(1719906839.628:779): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:53:59.628000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:01.412000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:01.412000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfc740 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:54:01.474039 kernel: audit: type=1400 audit(1719906841.412:780): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:01.474233 kernel: audit: type=1300 audit(1719906841.412:780): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfc740 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:54:01.474288 kernel: audit: type=1327 audit(1719906841.412:780): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:01.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:01.417000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:01.528164 kernel: audit: type=1400 audit(1719906841.417:781): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:01.528343 kernel: audit: type=1300 audit(1719906841.417:781): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfc980 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:54:01.417000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfc980 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:54:01.417000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:01.591652 kernel: audit: type=1327 audit(1719906841.417:781): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:01.591821 kernel: audit: type=1400 audit(1719906841.417:782): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:01.417000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:01.417000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfcb60 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:54:01.417000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:01.422000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:01.422000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfcd00 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:54:01.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:02.295894 kubelet[2103]: I0702 07:54:02.295852 2103 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 07:54:02.296585 env[1220]: time="2024-07-02T07:54:02.296354947Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:54:02.297023 kubelet[2103]: I0702 07:54:02.296653 2103 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 07:54:03.230565 kubelet[2103]: I0702 07:54:03.230508 2103 topology_manager.go:215] "Topology Admit Handler" podUID="ea1ec6ad-eb01-4284-b7a1-9444ad5649f0" podNamespace="kube-system" podName="kube-proxy-v6nzz" Jul 2 07:54:03.239459 systemd[1]: Created slice kubepods-besteffort-podea1ec6ad_eb01_4284_b7a1_9444ad5649f0.slice. Jul 2 07:54:03.355332 kubelet[2103]: I0702 07:54:03.354845 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ea1ec6ad-eb01-4284-b7a1-9444ad5649f0-xtables-lock\") pod \"kube-proxy-v6nzz\" (UID: \"ea1ec6ad-eb01-4284-b7a1-9444ad5649f0\") " pod="kube-system/kube-proxy-v6nzz" Jul 2 07:54:03.355332 kubelet[2103]: I0702 07:54:03.354993 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ea1ec6ad-eb01-4284-b7a1-9444ad5649f0-kube-proxy\") pod \"kube-proxy-v6nzz\" (UID: \"ea1ec6ad-eb01-4284-b7a1-9444ad5649f0\") " pod="kube-system/kube-proxy-v6nzz" Jul 2 07:54:03.355332 kubelet[2103]: I0702 07:54:03.355164 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ea1ec6ad-eb01-4284-b7a1-9444ad5649f0-lib-modules\") pod \"kube-proxy-v6nzz\" (UID: \"ea1ec6ad-eb01-4284-b7a1-9444ad5649f0\") " pod="kube-system/kube-proxy-v6nzz" Jul 2 07:54:03.355332 kubelet[2103]: I0702 07:54:03.355286 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ndxcd\" (UniqueName: \"kubernetes.io/projected/ea1ec6ad-eb01-4284-b7a1-9444ad5649f0-kube-api-access-ndxcd\") pod \"kube-proxy-v6nzz\" (UID: \"ea1ec6ad-eb01-4284-b7a1-9444ad5649f0\") " pod="kube-system/kube-proxy-v6nzz" Jul 2 07:54:03.361399 kubelet[2103]: I0702 07:54:03.361365 2103 topology_manager.go:215] "Topology Admit Handler" podUID="566b7122-fb56-4cf8-8ebd-cfc1559dbdea" podNamespace="tigera-operator" podName="tigera-operator-76c4974c85-djm6m" Jul 2 07:54:03.369496 systemd[1]: Created slice kubepods-besteffort-pod566b7122_fb56_4cf8_8ebd_cfc1559dbdea.slice. Jul 2 07:54:03.455882 kubelet[2103]: I0702 07:54:03.455823 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bbblw\" (UniqueName: \"kubernetes.io/projected/566b7122-fb56-4cf8-8ebd-cfc1559dbdea-kube-api-access-bbblw\") pod \"tigera-operator-76c4974c85-djm6m\" (UID: \"566b7122-fb56-4cf8-8ebd-cfc1559dbdea\") " pod="tigera-operator/tigera-operator-76c4974c85-djm6m" Jul 2 07:54:03.456138 kubelet[2103]: I0702 07:54:03.455894 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/566b7122-fb56-4cf8-8ebd-cfc1559dbdea-var-lib-calico\") pod \"tigera-operator-76c4974c85-djm6m\" (UID: \"566b7122-fb56-4cf8-8ebd-cfc1559dbdea\") " pod="tigera-operator/tigera-operator-76c4974c85-djm6m" Jul 2 07:54:03.549457 env[1220]: time="2024-07-02T07:54:03.549283396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v6nzz,Uid:ea1ec6ad-eb01-4284-b7a1-9444ad5649f0,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:03.588176 env[1220]: time="2024-07-02T07:54:03.588085219Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:03.588421 env[1220]: time="2024-07-02T07:54:03.588145858Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:03.588421 env[1220]: time="2024-07-02T07:54:03.588163915Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:03.588657 env[1220]: time="2024-07-02T07:54:03.588451246Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a934205dd52c614ce3459ae5515d9336d98bb087cf621951c9a5a445bb590057 pid=2205 runtime=io.containerd.runc.v2 Jul 2 07:54:03.622045 systemd[1]: Started cri-containerd-a934205dd52c614ce3459ae5515d9336d98bb087cf621951c9a5a445bb590057.scope. Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.646000 audit: BPF prog-id=109 op=LOAD Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139333432303564643532633631346365333435396165353531356439 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139333432303564643532633631346365333435396165353531356439 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.647000 audit: BPF prog-id=110 op=LOAD Jul 2 07:54:03.647000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1340 items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139333432303564643532633631346365333435396165353531356439 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.648000 audit: BPF prog-id=111 op=LOAD Jul 2 07:54:03.648000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1388 items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139333432303564643532633631346365333435396165353531356439 Jul 2 07:54:03.649000 audit: BPF prog-id=111 op=UNLOAD Jul 2 07:54:03.649000 audit: BPF prog-id=110 op=UNLOAD Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.649000 audit: BPF prog-id=112 op=LOAD Jul 2 07:54:03.649000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1798 items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139333432303564643532633631346365333435396165353531356439 Jul 2 07:54:03.668759 env[1220]: time="2024-07-02T07:54:03.668690428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v6nzz,Uid:ea1ec6ad-eb01-4284-b7a1-9444ad5649f0,Namespace:kube-system,Attempt:0,} returns sandbox id \"a934205dd52c614ce3459ae5515d9336d98bb087cf621951c9a5a445bb590057\"" Jul 2 07:54:03.673442 env[1220]: time="2024-07-02T07:54:03.673261420Z" level=info msg="CreateContainer within sandbox \"a934205dd52c614ce3459ae5515d9336d98bb087cf621951c9a5a445bb590057\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:54:03.676633 env[1220]: time="2024-07-02T07:54:03.676586618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-djm6m,Uid:566b7122-fb56-4cf8-8ebd-cfc1559dbdea,Namespace:tigera-operator,Attempt:0,}" Jul 2 07:54:03.699528 env[1220]: time="2024-07-02T07:54:03.699470469Z" level=info msg="CreateContainer within sandbox \"a934205dd52c614ce3459ae5515d9336d98bb087cf621951c9a5a445bb590057\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d1fc1a78fd5001194cfff0a161a4f59c39450b21afbcbd1989945a8e188f98f3\"" Jul 2 07:54:03.702853 env[1220]: time="2024-07-02T07:54:03.702781316Z" level=info msg="StartContainer for \"d1fc1a78fd5001194cfff0a161a4f59c39450b21afbcbd1989945a8e188f98f3\"" Jul 2 07:54:03.724324 env[1220]: time="2024-07-02T07:54:03.724175453Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:03.724605 env[1220]: time="2024-07-02T07:54:03.724558899Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:03.724781 env[1220]: time="2024-07-02T07:54:03.724740971Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:03.725226 env[1220]: time="2024-07-02T07:54:03.725176481Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01b4b3e51e19e1764e68c66d03b2097115bc31cecde3d8eb15c580d883f3caed pid=2245 runtime=io.containerd.runc.v2 Jul 2 07:54:03.747372 systemd[1]: Started cri-containerd-01b4b3e51e19e1764e68c66d03b2097115bc31cecde3d8eb15c580d883f3caed.scope. Jul 2 07:54:03.762996 systemd[1]: Started cri-containerd-d1fc1a78fd5001194cfff0a161a4f59c39450b21afbcbd1989945a8e188f98f3.scope. Jul 2 07:54:03.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.777000 audit: BPF prog-id=113 op=LOAD Jul 2 07:54:03.778000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.778000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2245 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623462336535316531396531373634653638633636643033623230 Jul 2 07:54:03.778000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.778000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2245 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623462336535316531396531373634653638633636643033623230 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.779000 audit: BPF prog-id=114 op=LOAD Jul 2 07:54:03.779000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001dbad0 items=0 ppid=2245 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623462336535316531396531373634653638633636643033623230 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.780000 audit: BPF prog-id=115 op=LOAD Jul 2 07:54:03.780000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001dbb18 items=0 ppid=2245 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623462336535316531396531373634653638633636643033623230 Jul 2 07:54:03.782000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:54:03.782000 audit: BPF prog-id=114 op=UNLOAD Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.782000 audit: BPF prog-id=116 op=LOAD Jul 2 07:54:03.782000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001dbf28 items=0 ppid=2245 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623462336535316531396531373634653638633636643033623230 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2bf9d95ac8 items=0 ppid=2205 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666331613738666435303031313934636666663061313631613466 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit: BPF prog-id=117 op=LOAD Jul 2 07:54:03.805000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d3b98 items=0 ppid=2205 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666331613738666435303031313934636666663061313631613466 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.805000 audit: BPF prog-id=118 op=LOAD Jul 2 07:54:03.805000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d3be8 items=0 ppid=2205 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666331613738666435303031313934636666663061313631613466 Jul 2 07:54:03.810000 audit: BPF prog-id=118 op=UNLOAD Jul 2 07:54:03.810000 audit: BPF prog-id=117 op=UNLOAD Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:03.810000 audit: BPF prog-id=119 op=LOAD Jul 2 07:54:03.810000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002d3c78 items=0 ppid=2205 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666331613738666435303031313934636666663061313631613466 Jul 2 07:54:03.837871 env[1220]: time="2024-07-02T07:54:03.837818985Z" level=info msg="StartContainer for \"d1fc1a78fd5001194cfff0a161a4f59c39450b21afbcbd1989945a8e188f98f3\" returns successfully" Jul 2 07:54:03.854989 env[1220]: time="2024-07-02T07:54:03.854932996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-djm6m,Uid:566b7122-fb56-4cf8-8ebd-cfc1559dbdea,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"01b4b3e51e19e1764e68c66d03b2097115bc31cecde3d8eb15c580d883f3caed\"" Jul 2 07:54:03.859885 env[1220]: time="2024-07-02T07:54:03.859827679Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 07:54:03.943000 audit[2336]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:03.943000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea0872460 a2=0 a3=7ffea087244c items=0 ppid=2287 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:54:03.946000 audit[2337]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:03.946000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6c99dda0 a2=0 a3=7ffd6c99dd8c items=0 ppid=2287 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.946000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:54:03.948000 audit[2338]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:03.948000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd309c5ad0 a2=0 a3=7ffd309c5abc items=0 ppid=2287 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:54:03.950000 audit[2339]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:03.950000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf82f8e80 a2=0 a3=7ffcf82f8e6c items=0 ppid=2287 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:54:03.954000 audit[2340]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:03.954000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff773c5a30 a2=0 a3=7fff773c5a1c items=0 ppid=2287 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:54:03.956000 audit[2341]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:03.956000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebf98df20 a2=0 a3=7ffebf98df0c items=0 ppid=2287 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:03.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:54:03.992407 kubelet[2103]: I0702 07:54:03.992360 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-v6nzz" podStartSLOduration=0.992289728 podStartE2EDuration="992.289728ms" podCreationTimestamp="2024-07-02 07:54:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:03.992207021 +0000 UTC m=+16.375902505" watchObservedRunningTime="2024-07-02 07:54:03.992289728 +0000 UTC m=+16.375985231" Jul 2 07:54:04.047000 audit[2342]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.047000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcb0713d60 a2=0 a3=7ffcb0713d4c items=0 ppid=2287 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:54:04.053000 audit[2344]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.053000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdfdededd0 a2=0 a3=7ffdfdededbc items=0 ppid=2287 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:54:04.060000 audit[2347]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.060000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffd1cb7bc0 a2=0 a3=7fffd1cb7bac items=0 ppid=2287 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:54:04.062000 audit[2348]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.062000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc611766c0 a2=0 a3=7ffc611766ac items=0 ppid=2287 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:54:04.065000 audit[2350]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.065000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5e0c6b00 a2=0 a3=7ffc5e0c6aec items=0 ppid=2287 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:54:04.067000 audit[2351]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.067000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2143b410 a2=0 a3=7ffd2143b3fc items=0 ppid=2287 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:54:04.071000 audit[2353]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.071000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe8154a1e0 a2=0 a3=7ffe8154a1cc items=0 ppid=2287 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:54:04.076000 audit[2356]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.076000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdde579660 a2=0 a3=7ffdde57964c items=0 ppid=2287 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:54:04.078000 audit[2357]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.078000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcb365ea0 a2=0 a3=7ffdcb365e8c items=0 ppid=2287 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:54:04.082000 audit[2359]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.082000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc4d4e740 a2=0 a3=7ffdc4d4e72c items=0 ppid=2287 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:54:04.084000 audit[2360]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.084000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6d1ec570 a2=0 a3=7ffd6d1ec55c items=0 ppid=2287 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:54:04.088000 audit[2362]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.088000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea6506f90 a2=0 a3=7ffea6506f7c items=0 ppid=2287 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:54:04.093000 audit[2365]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.093000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd13327e30 a2=0 a3=7ffd13327e1c items=0 ppid=2287 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:54:04.098000 audit[2368]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.098000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4eb6b2a0 a2=0 a3=7fff4eb6b28c items=0 ppid=2287 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:54:04.100000 audit[2369]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.100000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef59cdbb0 a2=0 a3=7ffef59cdb9c items=0 ppid=2287 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:54:04.104000 audit[2371]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.104000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff9492dbf0 a2=0 a3=7fff9492dbdc items=0 ppid=2287 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:54:04.109000 audit[2374]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.109000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9e4b0570 a2=0 a3=7fff9e4b055c items=0 ppid=2287 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:54:04.112000 audit[2375]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.112000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc6ca0530 a2=0 a3=7ffdc6ca051c items=0 ppid=2287 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:54:04.119000 audit[2377]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:54:04.119000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcd50f0d80 a2=0 a3=7ffcd50f0d6c items=0 ppid=2287 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:54:04.151000 audit[2383]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:04.151000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffffcd6ee90 a2=0 a3=7ffffcd6ee7c items=0 ppid=2287 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:04.163000 audit[2383]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:04.163000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffffcd6ee90 a2=0 a3=7ffffcd6ee7c items=0 ppid=2287 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:04.165000 audit[2388]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.165000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe6b8b4680 a2=0 a3=7ffe6b8b466c items=0 ppid=2287 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:54:04.169000 audit[2390]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.169000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffebb10c70 a2=0 a3=7fffebb10c5c items=0 ppid=2287 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:54:04.175000 audit[2393]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.175000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe82b10490 a2=0 a3=7ffe82b1047c items=0 ppid=2287 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:54:04.177000 audit[2394]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.177000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe11744300 a2=0 a3=7ffe117442ec items=0 ppid=2287 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:54:04.181000 audit[2396]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.181000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8ca02950 a2=0 a3=7fff8ca0293c items=0 ppid=2287 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:54:04.183000 audit[2397]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.183000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff14854ce0 a2=0 a3=7fff14854ccc items=0 ppid=2287 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:54:04.187000 audit[2399]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.187000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea04dd9e0 a2=0 a3=7ffea04dd9cc items=0 ppid=2287 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:54:04.192000 audit[2402]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.192000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffd9ab1520 a2=0 a3=7fffd9ab150c items=0 ppid=2287 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:54:04.194000 audit[2403]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.194000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff92111ef0 a2=0 a3=7fff92111edc items=0 ppid=2287 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:54:04.198000 audit[2405]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.198000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf04c1fe0 a2=0 a3=7ffcf04c1fcc items=0 ppid=2287 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:54:04.200000 audit[2406]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.200000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6b8104a0 a2=0 a3=7ffe6b81048c items=0 ppid=2287 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:54:04.204000 audit[2408]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.204000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7cd616d0 a2=0 a3=7ffd7cd616bc items=0 ppid=2287 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:54:04.212000 audit[2411]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.212000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd48f74940 a2=0 a3=7ffd48f7492c items=0 ppid=2287 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:54:04.218000 audit[2414]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.218000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd88975680 a2=0 a3=7ffd8897566c items=0 ppid=2287 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:54:04.220000 audit[2415]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.220000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce5d7ddf0 a2=0 a3=7ffce5d7dddc items=0 ppid=2287 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:54:04.225000 audit[2417]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.225000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff27a515f0 a2=0 a3=7fff27a515dc items=0 ppid=2287 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:54:04.231000 audit[2420]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.231000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeafab0db0 a2=0 a3=7ffeafab0d9c items=0 ppid=2287 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:54:04.232000 audit[2421]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.232000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4d3f16f0 a2=0 a3=7fff4d3f16dc items=0 ppid=2287 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:54:04.236000 audit[2423]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.236000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd4c535500 a2=0 a3=7ffd4c5354ec items=0 ppid=2287 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:54:04.238000 audit[2424]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.238000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7d689780 a2=0 a3=7ffc7d68976c items=0 ppid=2287 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:54:04.242000 audit[2426]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.242000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed0a46120 a2=0 a3=7ffed0a4610c items=0 ppid=2287 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:54:04.247000 audit[2429]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:54:04.247000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe303caf90 a2=0 a3=7ffe303caf7c items=0 ppid=2287 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:54:04.257000 audit[2431]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:54:04.257000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe50e961f0 a2=0 a3=7ffe50e961dc items=0 ppid=2287 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.257000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:04.258000 audit[2431]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:54:04.258000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe50e961f0 a2=0 a3=7ffe50e961dc items=0 ppid=2287 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:04.258000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:04.477281 systemd[1]: run-containerd-runc-k8s.io-a934205dd52c614ce3459ae5515d9336d98bb087cf621951c9a5a445bb590057-runc.SjTYqb.mount: Deactivated successfully. Jul 2 07:54:05.362093 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3275245268.mount: Deactivated successfully. Jul 2 07:54:06.241208 env[1220]: time="2024-07-02T07:54:06.241152841Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:06.244296 env[1220]: time="2024-07-02T07:54:06.244226418Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:06.246955 env[1220]: time="2024-07-02T07:54:06.246893115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:06.249423 env[1220]: time="2024-07-02T07:54:06.249378899Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:06.250329 env[1220]: time="2024-07-02T07:54:06.250276132Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 07:54:06.254755 env[1220]: time="2024-07-02T07:54:06.254690973Z" level=info msg="CreateContainer within sandbox \"01b4b3e51e19e1764e68c66d03b2097115bc31cecde3d8eb15c580d883f3caed\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 07:54:06.282133 env[1220]: time="2024-07-02T07:54:06.280222432Z" level=info msg="CreateContainer within sandbox \"01b4b3e51e19e1764e68c66d03b2097115bc31cecde3d8eb15c580d883f3caed\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"deefabffde045598b1de7e578cd062c9b7311b37778329f794936504f367acf1\"" Jul 2 07:54:06.283332 env[1220]: time="2024-07-02T07:54:06.283258458Z" level=info msg="StartContainer for \"deefabffde045598b1de7e578cd062c9b7311b37778329f794936504f367acf1\"" Jul 2 07:54:06.320155 systemd[1]: Started cri-containerd-deefabffde045598b1de7e578cd062c9b7311b37778329f794936504f367acf1.scope. Jul 2 07:54:06.366672 kernel: kauditd_printk_skb: 315 callbacks suppressed Jul 2 07:54:06.366854 kernel: audit: type=1400 audit(1719906846.339:877): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.410139 kernel: audit: type=1400 audit(1719906846.339:878): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.410277 kernel: audit: type=1400 audit(1719906846.339:879): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.453345 kernel: audit: type=1400 audit(1719906846.339:880): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.453509 kernel: audit: type=1400 audit(1719906846.339:881): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.474763 kernel: audit: type=1400 audit(1719906846.339:882): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.474918 kernel: audit: type=1400 audit(1719906846.339:883): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.516787 kernel: audit: type=1400 audit(1719906846.339:884): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.538614 kernel: audit: type=1400 audit(1719906846.339:885): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.365000 audit: BPF prog-id=120 op=LOAD Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2245 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:06.561151 kernel: audit: type=1400 audit(1719906846.365:886): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656661626666646530343535393862316465376535373863643036 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2245 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:06.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656661626666646530343535393862316465376535373863643036 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.366000 audit: BPF prog-id=121 op=LOAD Jul 2 07:54:06.366000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b81b0 items=0 ppid=2245 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:06.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656661626666646530343535393862316465376535373863643036 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit: BPF prog-id=122 op=LOAD Jul 2 07:54:06.367000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b81f8 items=0 ppid=2245 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:06.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656661626666646530343535393862316465376535373863643036 Jul 2 07:54:06.367000 audit: BPF prog-id=122 op=UNLOAD Jul 2 07:54:06.367000 audit: BPF prog-id=121 op=UNLOAD Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:06.367000 audit: BPF prog-id=123 op=LOAD Jul 2 07:54:06.367000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8608 items=0 ppid=2245 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:06.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656661626666646530343535393862316465376535373863643036 Jul 2 07:54:06.564213 env[1220]: time="2024-07-02T07:54:06.564151338Z" level=info msg="StartContainer for \"deefabffde045598b1de7e578cd062c9b7311b37778329f794936504f367acf1\" returns successfully" Jul 2 07:54:07.902470 kubelet[2103]: I0702 07:54:07.902386 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4974c85-djm6m" podStartSLOduration=2.510356884 podStartE2EDuration="4.902303113s" podCreationTimestamp="2024-07-02 07:54:03 +0000 UTC" firstStartedPulling="2024-07-02 07:54:03.858804296 +0000 UTC m=+16.242499766" lastFinishedPulling="2024-07-02 07:54:06.250750533 +0000 UTC m=+18.634445995" observedRunningTime="2024-07-02 07:54:07.005696923 +0000 UTC m=+19.389392407" watchObservedRunningTime="2024-07-02 07:54:07.902303113 +0000 UTC m=+20.285998594" Jul 2 07:54:09.562000 audit[2475]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:09.562000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff17064960 a2=0 a3=7fff1706494c items=0 ppid=2287 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:09.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:09.564000 audit[2475]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:09.564000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff17064960 a2=0 a3=0 items=0 ppid=2287 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:09.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:09.574000 audit[2477]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:09.574000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff3eb63d50 a2=0 a3=7fff3eb63d3c items=0 ppid=2287 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:09.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:09.575000 audit[2477]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:09.575000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff3eb63d50 a2=0 a3=0 items=0 ppid=2287 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:09.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:09.691897 kubelet[2103]: I0702 07:54:09.691847 2103 topology_manager.go:215] "Topology Admit Handler" podUID="e09fcd39-cd07-4a7e-8fd0-5d0c313f596e" podNamespace="calico-system" podName="calico-typha-b84d858cd-4vn4h" Jul 2 07:54:09.701840 systemd[1]: Created slice kubepods-besteffort-pode09fcd39_cd07_4a7e_8fd0_5d0c313f596e.slice. Jul 2 07:54:09.816302 kubelet[2103]: I0702 07:54:09.816171 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e09fcd39-cd07-4a7e-8fd0-5d0c313f596e-typha-certs\") pod \"calico-typha-b84d858cd-4vn4h\" (UID: \"e09fcd39-cd07-4a7e-8fd0-5d0c313f596e\") " pod="calico-system/calico-typha-b84d858cd-4vn4h" Jul 2 07:54:09.816617 kubelet[2103]: I0702 07:54:09.816595 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e09fcd39-cd07-4a7e-8fd0-5d0c313f596e-tigera-ca-bundle\") pod \"calico-typha-b84d858cd-4vn4h\" (UID: \"e09fcd39-cd07-4a7e-8fd0-5d0c313f596e\") " pod="calico-system/calico-typha-b84d858cd-4vn4h" Jul 2 07:54:09.816782 kubelet[2103]: I0702 07:54:09.816767 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dzjzx\" (UniqueName: \"kubernetes.io/projected/e09fcd39-cd07-4a7e-8fd0-5d0c313f596e-kube-api-access-dzjzx\") pod \"calico-typha-b84d858cd-4vn4h\" (UID: \"e09fcd39-cd07-4a7e-8fd0-5d0c313f596e\") " pod="calico-system/calico-typha-b84d858cd-4vn4h" Jul 2 07:54:09.880814 kubelet[2103]: I0702 07:54:09.880759 2103 topology_manager.go:215] "Topology Admit Handler" podUID="0a2fe374-e8d5-49ed-b807-9d24f0545db0" podNamespace="calico-system" podName="calico-node-dqtq4" Jul 2 07:54:09.889617 systemd[1]: Created slice kubepods-besteffort-pod0a2fe374_e8d5_49ed_b807_9d24f0545db0.slice. Jul 2 07:54:10.005759 env[1220]: time="2024-07-02T07:54:10.005697137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-b84d858cd-4vn4h,Uid:e09fcd39-cd07-4a7e-8fd0-5d0c313f596e,Namespace:calico-system,Attempt:0,}" Jul 2 07:54:10.008463 kubelet[2103]: I0702 07:54:10.008425 2103 topology_manager.go:215] "Topology Admit Handler" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" podNamespace="calico-system" podName="csi-node-driver-kmmzc" Jul 2 07:54:10.009001 kubelet[2103]: E0702 07:54:10.008960 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmmzc" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" Jul 2 07:54:10.027111 kubelet[2103]: I0702 07:54:10.026996 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-xtables-lock\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027111 kubelet[2103]: I0702 07:54:10.027078 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-cni-log-dir\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027359 kubelet[2103]: I0702 07:54:10.027149 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-flexvol-driver-host\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027359 kubelet[2103]: I0702 07:54:10.027187 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0a2fe374-e8d5-49ed-b807-9d24f0545db0-tigera-ca-bundle\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027359 kubelet[2103]: I0702 07:54:10.027217 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-var-lib-calico\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027359 kubelet[2103]: I0702 07:54:10.027249 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-cni-net-dir\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027359 kubelet[2103]: I0702 07:54:10.027281 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-policysync\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027616 kubelet[2103]: I0702 07:54:10.027317 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zm2wh\" (UniqueName: \"kubernetes.io/projected/0a2fe374-e8d5-49ed-b807-9d24f0545db0-kube-api-access-zm2wh\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027616 kubelet[2103]: I0702 07:54:10.027353 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-cni-bin-dir\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027616 kubelet[2103]: I0702 07:54:10.027388 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-lib-modules\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027616 kubelet[2103]: I0702 07:54:10.027424 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0a2fe374-e8d5-49ed-b807-9d24f0545db0-var-run-calico\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.027616 kubelet[2103]: I0702 07:54:10.027463 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0a2fe374-e8d5-49ed-b807-9d24f0545db0-node-certs\") pod \"calico-node-dqtq4\" (UID: \"0a2fe374-e8d5-49ed-b807-9d24f0545db0\") " pod="calico-system/calico-node-dqtq4" Jul 2 07:54:10.041873 env[1220]: time="2024-07-02T07:54:10.041771198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:10.042274 env[1220]: time="2024-07-02T07:54:10.042222360Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:10.042524 env[1220]: time="2024-07-02T07:54:10.042474905Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:10.042993 env[1220]: time="2024-07-02T07:54:10.042927963Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ab7758dd44b0beb411fad8ad380c37e57298c085d2d564de3dc61ebacab4a53 pid=2486 runtime=io.containerd.runc.v2 Jul 2 07:54:10.102802 systemd[1]: Started cri-containerd-6ab7758dd44b0beb411fad8ad380c37e57298c085d2d564de3dc61ebacab4a53.scope. Jul 2 07:54:10.130806 kubelet[2103]: I0702 07:54:10.128715 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/6c454dcc-a1d2-4ff3-8312-8135e3289602-kubelet-dir\") pod \"csi-node-driver-kmmzc\" (UID: \"6c454dcc-a1d2-4ff3-8312-8135e3289602\") " pod="calico-system/csi-node-driver-kmmzc" Jul 2 07:54:10.130806 kubelet[2103]: I0702 07:54:10.128793 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/6c454dcc-a1d2-4ff3-8312-8135e3289602-varrun\") pod \"csi-node-driver-kmmzc\" (UID: \"6c454dcc-a1d2-4ff3-8312-8135e3289602\") " pod="calico-system/csi-node-driver-kmmzc" Jul 2 07:54:10.130806 kubelet[2103]: I0702 07:54:10.128868 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/6c454dcc-a1d2-4ff3-8312-8135e3289602-registration-dir\") pod \"csi-node-driver-kmmzc\" (UID: \"6c454dcc-a1d2-4ff3-8312-8135e3289602\") " pod="calico-system/csi-node-driver-kmmzc" Jul 2 07:54:10.130806 kubelet[2103]: I0702 07:54:10.128904 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/6c454dcc-a1d2-4ff3-8312-8135e3289602-socket-dir\") pod \"csi-node-driver-kmmzc\" (UID: \"6c454dcc-a1d2-4ff3-8312-8135e3289602\") " pod="calico-system/csi-node-driver-kmmzc" Jul 2 07:54:10.130806 kubelet[2103]: I0702 07:54:10.129116 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wkwb7\" (UniqueName: \"kubernetes.io/projected/6c454dcc-a1d2-4ff3-8312-8135e3289602-kube-api-access-wkwb7\") pod \"csi-node-driver-kmmzc\" (UID: \"6c454dcc-a1d2-4ff3-8312-8135e3289602\") " pod="calico-system/csi-node-driver-kmmzc" Jul 2 07:54:10.135978 kubelet[2103]: E0702 07:54:10.135950 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.136203 kubelet[2103]: W0702 07:54:10.136178 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.136374 kubelet[2103]: E0702 07:54:10.136356 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.136801 kubelet[2103]: E0702 07:54:10.136788 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.136923 kubelet[2103]: W0702 07:54:10.136906 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.137028 kubelet[2103]: E0702 07:54:10.137015 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.146460 kubelet[2103]: E0702 07:54:10.146436 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.146635 kubelet[2103]: W0702 07:54:10.146616 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.146745 kubelet[2103]: E0702 07:54:10.146729 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.165000 audit: BPF prog-id=124 op=LOAD Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2486 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623737353864643434623062656234313166616438616433383063 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2486 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623737353864643434623062656234313166616438616433383063 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit: BPF prog-id=125 op=LOAD Jul 2 07:54:10.166000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003669d0 items=0 ppid=2486 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623737353864643434623062656234313166616438616433383063 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit: BPF prog-id=126 op=LOAD Jul 2 07:54:10.166000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000366a18 items=0 ppid=2486 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623737353864643434623062656234313166616438616433383063 Jul 2 07:54:10.166000 audit: BPF prog-id=126 op=UNLOAD Jul 2 07:54:10.166000 audit: BPF prog-id=125 op=UNLOAD Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.166000 audit: BPF prog-id=127 op=LOAD Jul 2 07:54:10.166000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000366e28 items=0 ppid=2486 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623737353864643434623062656234313166616438616433383063 Jul 2 07:54:10.202334 env[1220]: time="2024-07-02T07:54:10.202271291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dqtq4,Uid:0a2fe374-e8d5-49ed-b807-9d24f0545db0,Namespace:calico-system,Attempt:0,}" Jul 2 07:54:10.231493 env[1220]: time="2024-07-02T07:54:10.226649039Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:10.231493 env[1220]: time="2024-07-02T07:54:10.226747353Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:10.231493 env[1220]: time="2024-07-02T07:54:10.226783575Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:10.231493 env[1220]: time="2024-07-02T07:54:10.227148996Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2 pid=2527 runtime=io.containerd.runc.v2 Jul 2 07:54:10.231861 kubelet[2103]: E0702 07:54:10.229881 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.231861 kubelet[2103]: W0702 07:54:10.229904 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.231861 kubelet[2103]: E0702 07:54:10.229935 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.231861 kubelet[2103]: E0702 07:54:10.230440 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.231861 kubelet[2103]: W0702 07:54:10.230456 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.231861 kubelet[2103]: E0702 07:54:10.230486 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.231861 kubelet[2103]: E0702 07:54:10.230942 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.231861 kubelet[2103]: W0702 07:54:10.230961 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.231861 kubelet[2103]: E0702 07:54:10.230995 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.231861 kubelet[2103]: E0702 07:54:10.231387 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.232509 kubelet[2103]: W0702 07:54:10.231403 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.232509 kubelet[2103]: E0702 07:54:10.231428 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.232509 kubelet[2103]: E0702 07:54:10.231816 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.232509 kubelet[2103]: W0702 07:54:10.231839 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.232509 kubelet[2103]: E0702 07:54:10.231962 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.232509 kubelet[2103]: E0702 07:54:10.232226 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.232509 kubelet[2103]: W0702 07:54:10.232239 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.232509 kubelet[2103]: E0702 07:54:10.232357 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.232944 kubelet[2103]: E0702 07:54:10.232545 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.232944 kubelet[2103]: W0702 07:54:10.232556 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.232944 kubelet[2103]: E0702 07:54:10.232671 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.232944 kubelet[2103]: E0702 07:54:10.232863 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.232944 kubelet[2103]: W0702 07:54:10.232874 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.233267 kubelet[2103]: E0702 07:54:10.232988 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.233267 kubelet[2103]: E0702 07:54:10.233194 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.233267 kubelet[2103]: W0702 07:54:10.233206 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.233436 kubelet[2103]: E0702 07:54:10.233317 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.233522 kubelet[2103]: E0702 07:54:10.233501 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.233522 kubelet[2103]: W0702 07:54:10.233514 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.233671 kubelet[2103]: E0702 07:54:10.233629 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.236118 kubelet[2103]: E0702 07:54:10.233811 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.236118 kubelet[2103]: W0702 07:54:10.233825 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.236118 kubelet[2103]: E0702 07:54:10.233951 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.236118 kubelet[2103]: E0702 07:54:10.234153 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.236118 kubelet[2103]: W0702 07:54:10.234165 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.236118 kubelet[2103]: E0702 07:54:10.234281 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.236118 kubelet[2103]: E0702 07:54:10.234468 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.236118 kubelet[2103]: W0702 07:54:10.234480 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.236118 kubelet[2103]: E0702 07:54:10.234593 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.236118 kubelet[2103]: E0702 07:54:10.234803 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.236772 kubelet[2103]: W0702 07:54:10.234816 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.236772 kubelet[2103]: E0702 07:54:10.234950 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.236772 kubelet[2103]: E0702 07:54:10.235175 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.236772 kubelet[2103]: W0702 07:54:10.235187 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.236772 kubelet[2103]: E0702 07:54:10.235301 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.236772 kubelet[2103]: E0702 07:54:10.235478 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.236772 kubelet[2103]: W0702 07:54:10.235489 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.236772 kubelet[2103]: E0702 07:54:10.235602 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.236772 kubelet[2103]: E0702 07:54:10.235823 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.236772 kubelet[2103]: W0702 07:54:10.235844 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.237320 kubelet[2103]: E0702 07:54:10.235960 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.237320 kubelet[2103]: E0702 07:54:10.236189 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.237320 kubelet[2103]: W0702 07:54:10.236201 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.237320 kubelet[2103]: E0702 07:54:10.236315 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.237320 kubelet[2103]: E0702 07:54:10.236520 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.237320 kubelet[2103]: W0702 07:54:10.236532 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.237320 kubelet[2103]: E0702 07:54:10.236646 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.237320 kubelet[2103]: E0702 07:54:10.236863 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.237320 kubelet[2103]: W0702 07:54:10.236874 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.237320 kubelet[2103]: E0702 07:54:10.236989 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.237771 kubelet[2103]: E0702 07:54:10.237336 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.237771 kubelet[2103]: W0702 07:54:10.237348 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.240108 kubelet[2103]: E0702 07:54:10.239899 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.240427 kubelet[2103]: E0702 07:54:10.240397 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.240427 kubelet[2103]: W0702 07:54:10.240414 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.240648 kubelet[2103]: E0702 07:54:10.240569 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.240820 kubelet[2103]: E0702 07:54:10.240777 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.240820 kubelet[2103]: W0702 07:54:10.240797 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.241027 kubelet[2103]: E0702 07:54:10.240953 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.241210 kubelet[2103]: E0702 07:54:10.241190 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.241210 kubelet[2103]: W0702 07:54:10.241210 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.241433 kubelet[2103]: E0702 07:54:10.241348 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.241562 kubelet[2103]: E0702 07:54:10.241543 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.241562 kubelet[2103]: W0702 07:54:10.241561 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.241761 kubelet[2103]: E0702 07:54:10.241579 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.266518 kubelet[2103]: E0702 07:54:10.266480 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:10.266518 kubelet[2103]: W0702 07:54:10.266513 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:10.266763 kubelet[2103]: E0702 07:54:10.266544 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:10.279610 env[1220]: time="2024-07-02T07:54:10.279443327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-b84d858cd-4vn4h,Uid:e09fcd39-cd07-4a7e-8fd0-5d0c313f596e,Namespace:calico-system,Attempt:0,} returns sandbox id \"6ab7758dd44b0beb411fad8ad380c37e57298c085d2d564de3dc61ebacab4a53\"" Jul 2 07:54:10.281693 env[1220]: time="2024-07-02T07:54:10.281646905Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 07:54:10.289819 systemd[1]: Started cri-containerd-e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2.scope. Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.319000 audit: BPF prog-id=128 op=LOAD Jul 2 07:54:10.320000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.320000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2527 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531353331626461306363633164313234323233323734326531386639 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2527 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531353331626461306363633164313234323233323734326531386639 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.321000 audit: BPF prog-id=129 op=LOAD Jul 2 07:54:10.321000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000ebfc0 items=0 ppid=2527 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531353331626461306363633164313234323233323734326531386639 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.322000 audit: BPF prog-id=130 op=LOAD Jul 2 07:54:10.322000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d0008 items=0 ppid=2527 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531353331626461306363633164313234323233323734326531386639 Jul 2 07:54:10.323000 audit: BPF prog-id=130 op=UNLOAD Jul 2 07:54:10.323000 audit: BPF prog-id=129 op=UNLOAD Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:10.324000 audit: BPF prog-id=131 op=LOAD Jul 2 07:54:10.324000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0418 items=0 ppid=2527 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531353331626461306363633164313234323233323734326531386639 Jul 2 07:54:10.345049 env[1220]: time="2024-07-02T07:54:10.344994095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dqtq4,Uid:0a2fe374-e8d5-49ed-b807-9d24f0545db0,Namespace:calico-system,Attempt:0,} returns sandbox id \"e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2\"" Jul 2 07:54:10.588000 audit[2594]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:10.588000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff07ea5ce0 a2=0 a3=7fff07ea5ccc items=0 ppid=2287 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:10.591000 audit[2594]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:10.591000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff07ea5ce0 a2=0 a3=0 items=0 ppid=2287 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:10.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:11.892847 kubelet[2103]: E0702 07:54:11.892807 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmmzc" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" Jul 2 07:54:12.465883 env[1220]: time="2024-07-02T07:54:12.465816907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:12.468843 env[1220]: time="2024-07-02T07:54:12.468793800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:12.471408 env[1220]: time="2024-07-02T07:54:12.471367162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:12.474104 env[1220]: time="2024-07-02T07:54:12.474047529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:12.474815 env[1220]: time="2024-07-02T07:54:12.474765052Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 07:54:12.487183 env[1220]: time="2024-07-02T07:54:12.480569783Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:54:12.500733 env[1220]: time="2024-07-02T07:54:12.500666241Z" level=info msg="CreateContainer within sandbox \"6ab7758dd44b0beb411fad8ad380c37e57298c085d2d564de3dc61ebacab4a53\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 07:54:12.527177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount843669996.mount: Deactivated successfully. Jul 2 07:54:12.534091 env[1220]: time="2024-07-02T07:54:12.534018367Z" level=info msg="CreateContainer within sandbox \"6ab7758dd44b0beb411fad8ad380c37e57298c085d2d564de3dc61ebacab4a53\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5bc88e4cde6cc5e44d0a573efb8609cec7326157f28f772866308537acbe6d12\"" Jul 2 07:54:12.535192 env[1220]: time="2024-07-02T07:54:12.535146898Z" level=info msg="StartContainer for \"5bc88e4cde6cc5e44d0a573efb8609cec7326157f28f772866308537acbe6d12\"" Jul 2 07:54:12.597806 systemd[1]: Started cri-containerd-5bc88e4cde6cc5e44d0a573efb8609cec7326157f28f772866308537acbe6d12.scope. Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.636349 kernel: kauditd_printk_skb: 179 callbacks suppressed Jul 2 07:54:12.636417 kernel: audit: type=1400 audit(1719906852.629:937): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.657115 kernel: audit: type=1400 audit(1719906852.629:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.701727 kernel: audit: type=1400 audit(1719906852.629:939): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.723194 kernel: audit: type=1400 audit(1719906852.629:940): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.749085 kernel: audit: type=1400 audit(1719906852.629:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.775958 kernel: audit: type=1400 audit(1719906852.629:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.776115 kernel: audit: type=1400 audit(1719906852.629:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.812872 kernel: audit: type=1400 audit(1719906852.629:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.856597 kernel: audit: type=1400 audit(1719906852.629:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.856780 kernel: audit: type=1400 audit(1719906852.676:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.676000 audit: BPF prog-id=132 op=LOAD Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2486 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:12.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633838653463646536636335653434643061353733656662383630 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2486 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:12.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633838653463646536636335653434643061353733656662383630 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.679000 audit: BPF prog-id=133 op=LOAD Jul 2 07:54:12.679000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a1fb0 items=0 ppid=2486 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:12.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633838653463646536636335653434643061353733656662383630 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit: BPF prog-id=134 op=LOAD Jul 2 07:54:12.700000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b7e98 items=0 ppid=2486 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:12.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633838653463646536636335653434643061353733656662383630 Jul 2 07:54:12.700000 audit: BPF prog-id=134 op=UNLOAD Jul 2 07:54:12.700000 audit: BPF prog-id=133 op=UNLOAD Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:12.700000 audit: BPF prog-id=135 op=LOAD Jul 2 07:54:12.700000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00040c2a8 items=0 ppid=2486 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:12.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633838653463646536636335653434643061353733656662383630 Jul 2 07:54:12.886776 env[1220]: time="2024-07-02T07:54:12.886722396Z" level=info msg="StartContainer for \"5bc88e4cde6cc5e44d0a573efb8609cec7326157f28f772866308537acbe6d12\" returns successfully" Jul 2 07:54:13.056138 kubelet[2103]: I0702 07:54:13.055999 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-b84d858cd-4vn4h" podStartSLOduration=1.861781763 podStartE2EDuration="4.055923194s" podCreationTimestamp="2024-07-02 07:54:09 +0000 UTC" firstStartedPulling="2024-07-02 07:54:10.281094575 +0000 UTC m=+22.664790036" lastFinishedPulling="2024-07-02 07:54:12.475236011 +0000 UTC m=+24.858931467" observedRunningTime="2024-07-02 07:54:13.055767082 +0000 UTC m=+25.439462564" watchObservedRunningTime="2024-07-02 07:54:13.055923194 +0000 UTC m=+25.439618676" Jul 2 07:54:13.104606 kubelet[2103]: E0702 07:54:13.104555 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.104781 kubelet[2103]: W0702 07:54:13.104659 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.104781 kubelet[2103]: E0702 07:54:13.104707 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.105278 kubelet[2103]: E0702 07:54:13.105224 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.105278 kubelet[2103]: W0702 07:54:13.105264 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.105449 kubelet[2103]: E0702 07:54:13.105287 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.105700 kubelet[2103]: E0702 07:54:13.105665 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.105700 kubelet[2103]: W0702 07:54:13.105680 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.105864 kubelet[2103]: E0702 07:54:13.105782 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.106253 kubelet[2103]: E0702 07:54:13.106231 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.106353 kubelet[2103]: W0702 07:54:13.106262 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.106353 kubelet[2103]: E0702 07:54:13.106283 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.106686 kubelet[2103]: E0702 07:54:13.106653 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.106686 kubelet[2103]: W0702 07:54:13.106680 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.106866 kubelet[2103]: E0702 07:54:13.106700 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.107213 kubelet[2103]: E0702 07:54:13.107177 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.107213 kubelet[2103]: W0702 07:54:13.107195 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.107803 kubelet[2103]: E0702 07:54:13.107214 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.107803 kubelet[2103]: E0702 07:54:13.107499 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.107803 kubelet[2103]: W0702 07:54:13.107522 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.107803 kubelet[2103]: E0702 07:54:13.107538 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.108030 kubelet[2103]: E0702 07:54:13.107969 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.108030 kubelet[2103]: W0702 07:54:13.107982 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.108030 kubelet[2103]: E0702 07:54:13.108003 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.108918 kubelet[2103]: E0702 07:54:13.108420 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.108918 kubelet[2103]: W0702 07:54:13.108451 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.108918 kubelet[2103]: E0702 07:54:13.108478 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.108918 kubelet[2103]: E0702 07:54:13.108845 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.108918 kubelet[2103]: W0702 07:54:13.108858 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.108918 kubelet[2103]: E0702 07:54:13.108878 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.109322 kubelet[2103]: E0702 07:54:13.109174 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.109322 kubelet[2103]: W0702 07:54:13.109187 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.109322 kubelet[2103]: E0702 07:54:13.109206 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.109489 kubelet[2103]: E0702 07:54:13.109481 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.109550 kubelet[2103]: W0702 07:54:13.109493 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.109550 kubelet[2103]: E0702 07:54:13.109514 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.109824 kubelet[2103]: E0702 07:54:13.109801 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.109824 kubelet[2103]: W0702 07:54:13.109823 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.109976 kubelet[2103]: E0702 07:54:13.109842 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.110170 kubelet[2103]: E0702 07:54:13.110147 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.110170 kubelet[2103]: W0702 07:54:13.110165 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.110170 kubelet[2103]: E0702 07:54:13.110183 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.110568 kubelet[2103]: E0702 07:54:13.110547 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.110568 kubelet[2103]: W0702 07:54:13.110565 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.110769 kubelet[2103]: E0702 07:54:13.110584 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.174111 kubelet[2103]: E0702 07:54:13.174054 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.174111 kubelet[2103]: W0702 07:54:13.174103 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.174397 kubelet[2103]: E0702 07:54:13.174134 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.174596 kubelet[2103]: E0702 07:54:13.174571 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.174596 kubelet[2103]: W0702 07:54:13.174594 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.174758 kubelet[2103]: E0702 07:54:13.174630 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.175027 kubelet[2103]: E0702 07:54:13.175003 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.175027 kubelet[2103]: W0702 07:54:13.175024 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.175239 kubelet[2103]: E0702 07:54:13.175049 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.175418 kubelet[2103]: E0702 07:54:13.175395 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.175418 kubelet[2103]: W0702 07:54:13.175417 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.175631 kubelet[2103]: E0702 07:54:13.175442 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.175801 kubelet[2103]: E0702 07:54:13.175779 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.175888 kubelet[2103]: W0702 07:54:13.175801 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.175963 kubelet[2103]: E0702 07:54:13.175938 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.176199 kubelet[2103]: E0702 07:54:13.176177 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.176199 kubelet[2103]: W0702 07:54:13.176196 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.176361 kubelet[2103]: E0702 07:54:13.176332 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.176570 kubelet[2103]: E0702 07:54:13.176525 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.177699 kubelet[2103]: W0702 07:54:13.176546 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.177842 kubelet[2103]: E0702 07:54:13.177822 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.178078 kubelet[2103]: E0702 07:54:13.178040 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.178195 kubelet[2103]: W0702 07:54:13.178097 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.178264 kubelet[2103]: E0702 07:54:13.178226 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.178475 kubelet[2103]: E0702 07:54:13.178452 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.178475 kubelet[2103]: W0702 07:54:13.178473 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.178610 kubelet[2103]: E0702 07:54:13.178590 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.178805 kubelet[2103]: E0702 07:54:13.178785 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.178805 kubelet[2103]: W0702 07:54:13.178803 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.178963 kubelet[2103]: E0702 07:54:13.178828 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.179174 kubelet[2103]: E0702 07:54:13.179154 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.179174 kubelet[2103]: W0702 07:54:13.179172 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.179316 kubelet[2103]: E0702 07:54:13.179197 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.179540 kubelet[2103]: E0702 07:54:13.179519 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.179540 kubelet[2103]: W0702 07:54:13.179538 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.179685 kubelet[2103]: E0702 07:54:13.179671 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.180172 kubelet[2103]: E0702 07:54:13.180150 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.180172 kubelet[2103]: W0702 07:54:13.180172 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.180330 kubelet[2103]: E0702 07:54:13.180290 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.202018 kubelet[2103]: E0702 07:54:13.201978 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.202018 kubelet[2103]: W0702 07:54:13.202009 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.202892 kubelet[2103]: E0702 07:54:13.202855 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.204541 kubelet[2103]: E0702 07:54:13.204511 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.204680 kubelet[2103]: W0702 07:54:13.204537 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.204768 kubelet[2103]: E0702 07:54:13.204743 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.205058 kubelet[2103]: E0702 07:54:13.205035 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.205193 kubelet[2103]: W0702 07:54:13.205083 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.208518 kubelet[2103]: E0702 07:54:13.208489 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.208829 kubelet[2103]: E0702 07:54:13.208788 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.208829 kubelet[2103]: W0702 07:54:13.208817 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.208988 kubelet[2103]: E0702 07:54:13.208841 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.210043 kubelet[2103]: E0702 07:54:13.210020 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:54:13.210043 kubelet[2103]: W0702 07:54:13.210039 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:54:13.210233 kubelet[2103]: E0702 07:54:13.210076 2103 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:54:13.603447 env[1220]: time="2024-07-02T07:54:13.603375080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:13.608007 env[1220]: time="2024-07-02T07:54:13.607961731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:13.611410 env[1220]: time="2024-07-02T07:54:13.611371689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:13.614622 env[1220]: time="2024-07-02T07:54:13.614585030Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:13.616683 env[1220]: time="2024-07-02T07:54:13.615794252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:54:13.619942 env[1220]: time="2024-07-02T07:54:13.619904480Z" level=info msg="CreateContainer within sandbox \"e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:54:13.654028 env[1220]: time="2024-07-02T07:54:13.653970897Z" level=info msg="CreateContainer within sandbox \"e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362\"" Jul 2 07:54:13.655352 env[1220]: time="2024-07-02T07:54:13.655309841Z" level=info msg="StartContainer for \"5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362\"" Jul 2 07:54:13.690387 systemd[1]: Started cri-containerd-5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362.scope. Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdf1f3b9cc8 items=0 ppid=2527 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383561373563313235636334636261373765306337306434323832 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit: BPF prog-id=136 op=LOAD Jul 2 07:54:13.745000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000391d48 items=0 ppid=2527 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383561373563313235636334636261373765306337306434323832 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit: BPF prog-id=137 op=LOAD Jul 2 07:54:13.745000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000391d98 items=0 ppid=2527 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383561373563313235636334636261373765306337306434323832 Jul 2 07:54:13.745000 audit: BPF prog-id=137 op=UNLOAD Jul 2 07:54:13.745000 audit: BPF prog-id=136 op=UNLOAD Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:13.745000 audit: BPF prog-id=138 op=LOAD Jul 2 07:54:13.745000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000391e28 items=0 ppid=2527 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:13.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383561373563313235636334636261373765306337306434323832 Jul 2 07:54:13.770718 env[1220]: time="2024-07-02T07:54:13.770649820Z" level=info msg="StartContainer for \"5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362\" returns successfully" Jul 2 07:54:13.798007 systemd[1]: cri-containerd-5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362.scope: Deactivated successfully. Jul 2 07:54:13.800000 audit: BPF prog-id=138 op=UNLOAD Jul 2 07:54:13.893396 kubelet[2103]: E0702 07:54:13.893271 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmmzc" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" Jul 2 07:54:14.010897 kubelet[2103]: I0702 07:54:14.010859 2103 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:54:14.412036 env[1220]: time="2024-07-02T07:54:14.411708849Z" level=info msg="shim disconnected" id=5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362 Jul 2 07:54:14.412036 env[1220]: time="2024-07-02T07:54:14.411781579Z" level=warning msg="cleaning up after shim disconnected" id=5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362 namespace=k8s.io Jul 2 07:54:14.412036 env[1220]: time="2024-07-02T07:54:14.411800755Z" level=info msg="cleaning up dead shim" Jul 2 07:54:14.428076 env[1220]: time="2024-07-02T07:54:14.428006617Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:54:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2720 runtime=io.containerd.runc.v2\n" Jul 2 07:54:14.485882 systemd[1]: run-containerd-runc-k8s.io-5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362-runc.lvdXsD.mount: Deactivated successfully. Jul 2 07:54:14.486042 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5285a75c125cc4cba77e0c70d42829b7d11ce343f6b878f6238399722de79362-rootfs.mount: Deactivated successfully. Jul 2 07:54:15.017495 env[1220]: time="2024-07-02T07:54:15.017438178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:54:15.892718 kubelet[2103]: E0702 07:54:15.890813 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmmzc" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" Jul 2 07:54:16.509692 kubelet[2103]: I0702 07:54:16.509304 2103 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:54:16.556000 audit[2735]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:16.556000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffc782a910 a2=0 a3=7fffc782a8fc items=0 ppid=2287 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:16.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:16.557000 audit[2735]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:16.557000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffc782a910 a2=0 a3=7fffc782a8fc items=0 ppid=2287 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:16.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:17.893249 kubelet[2103]: E0702 07:54:17.892772 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmmzc" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" Jul 2 07:54:19.479370 env[1220]: time="2024-07-02T07:54:19.479277793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:19.483796 env[1220]: time="2024-07-02T07:54:19.483723656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:19.485561 env[1220]: time="2024-07-02T07:54:19.485495152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:19.488049 env[1220]: time="2024-07-02T07:54:19.487978158Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:19.489265 env[1220]: time="2024-07-02T07:54:19.489220615Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:54:19.493035 env[1220]: time="2024-07-02T07:54:19.492988837Z" level=info msg="CreateContainer within sandbox \"e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:54:19.514913 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount107075452.mount: Deactivated successfully. Jul 2 07:54:19.521576 env[1220]: time="2024-07-02T07:54:19.521512652Z" level=info msg="CreateContainer within sandbox \"e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e\"" Jul 2 07:54:19.524470 env[1220]: time="2024-07-02T07:54:19.522689090Z" level=info msg="StartContainer for \"2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e\"" Jul 2 07:54:19.562339 systemd[1]: run-containerd-runc-k8s.io-2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e-runc.KID198.mount: Deactivated successfully. Jul 2 07:54:19.568269 systemd[1]: Started cri-containerd-2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e.scope. Jul 2 07:54:19.622539 kernel: kauditd_printk_skb: 97 callbacks suppressed Jul 2 07:54:19.622752 kernel: audit: type=1400 audit(1719906859.596:964): avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f622244ec38 items=0 ppid=2527 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:19.663096 kernel: audit: type=1300 audit(1719906859.596:964): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f622244ec38 items=0 ppid=2527 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:19.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383239323032393762306439633966336666373538373730383838 Jul 2 07:54:19.667553 env[1220]: time="2024-07-02T07:54:19.667475802Z" level=info msg="StartContainer for \"2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e\" returns successfully" Jul 2 07:54:19.699104 kernel: audit: type=1327 audit(1719906859.596:964): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383239323032393762306439633966336666373538373730383838 Jul 2 07:54:19.699254 kernel: audit: type=1400 audit(1719906859.596:965): avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.716105 kernel: audit: type=1400 audit(1719906859.596:965): avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.756672 kernel: audit: type=1400 audit(1719906859.596:965): avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.777692 kernel: audit: type=1400 audit(1719906859.596:965): avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.799109 kernel: audit: type=1400 audit(1719906859.596:965): avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.820333 kernel: audit: type=1400 audit(1719906859.596:965): avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.841418 kernel: audit: type=1400 audit(1719906859.596:965): avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.596000 audit: BPF prog-id=139 op=LOAD Jul 2 07:54:19.596000 audit[2745]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000286a98 items=0 ppid=2527 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:19.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383239323032393762306439633966336666373538373730383838 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit: BPF prog-id=140 op=LOAD Jul 2 07:54:19.622000 audit[2745]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000286ae8 items=0 ppid=2527 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:19.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383239323032393762306439633966336666373538373730383838 Jul 2 07:54:19.622000 audit: BPF prog-id=140 op=UNLOAD Jul 2 07:54:19.622000 audit: BPF prog-id=139 op=UNLOAD Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:19.622000 audit: BPF prog-id=141 op=LOAD Jul 2 07:54:19.622000 audit[2745]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000286b78 items=0 ppid=2527 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:19.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383239323032393762306439633966336666373538373730383838 Jul 2 07:54:19.890212 kubelet[2103]: E0702 07:54:19.890167 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmmzc" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" Jul 2 07:54:20.432809 env[1220]: time="2024-07-02T07:54:20.432714077Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:54:20.435610 systemd[1]: cri-containerd-2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e.scope: Deactivated successfully. Jul 2 07:54:20.439000 audit: BPF prog-id=141 op=UNLOAD Jul 2 07:54:20.507678 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e-rootfs.mount: Deactivated successfully. Jul 2 07:54:20.514609 kubelet[2103]: I0702 07:54:20.514337 2103 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 07:54:20.544439 kubelet[2103]: I0702 07:54:20.544054 2103 topology_manager.go:215] "Topology Admit Handler" podUID="8c996f67-c276-45e6-864e-55e4231c520c" podNamespace="kube-system" podName="coredns-76f75df574-9skwb" Jul 2 07:54:20.552600 kubelet[2103]: I0702 07:54:20.552162 2103 topology_manager.go:215] "Topology Admit Handler" podUID="bddebf50-2327-45c6-95ff-420ceba20596" podNamespace="calico-system" podName="calico-kube-controllers-68959dfc8c-clwzs" Jul 2 07:54:20.552374 systemd[1]: Created slice kubepods-burstable-pod8c996f67_c276_45e6_864e_55e4231c520c.slice. Jul 2 07:54:20.554968 kubelet[2103]: I0702 07:54:20.554937 2103 topology_manager.go:215] "Topology Admit Handler" podUID="5ebd62fe-ac31-46ea-b90a-1d75ce024bd1" podNamespace="kube-system" podName="coredns-76f75df574-2f6gv" Jul 2 07:54:20.567819 systemd[1]: Created slice kubepods-besteffort-podbddebf50_2327_45c6_95ff_420ceba20596.slice. Jul 2 07:54:20.579826 systemd[1]: Created slice kubepods-burstable-pod5ebd62fe_ac31_46ea_b90a_1d75ce024bd1.slice. Jul 2 07:54:20.631369 kubelet[2103]: I0702 07:54:20.631323 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4tbzb\" (UniqueName: \"kubernetes.io/projected/bddebf50-2327-45c6-95ff-420ceba20596-kube-api-access-4tbzb\") pod \"calico-kube-controllers-68959dfc8c-clwzs\" (UID: \"bddebf50-2327-45c6-95ff-420ceba20596\") " pod="calico-system/calico-kube-controllers-68959dfc8c-clwzs" Jul 2 07:54:20.631705 kubelet[2103]: I0702 07:54:20.631669 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bddebf50-2327-45c6-95ff-420ceba20596-tigera-ca-bundle\") pod \"calico-kube-controllers-68959dfc8c-clwzs\" (UID: \"bddebf50-2327-45c6-95ff-420ceba20596\") " pod="calico-system/calico-kube-controllers-68959dfc8c-clwzs" Jul 2 07:54:20.631825 kubelet[2103]: I0702 07:54:20.631726 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8c996f67-c276-45e6-864e-55e4231c520c-config-volume\") pod \"coredns-76f75df574-9skwb\" (UID: \"8c996f67-c276-45e6-864e-55e4231c520c\") " pod="kube-system/coredns-76f75df574-9skwb" Jul 2 07:54:20.631825 kubelet[2103]: I0702 07:54:20.631783 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9gdfj\" (UniqueName: \"kubernetes.io/projected/8c996f67-c276-45e6-864e-55e4231c520c-kube-api-access-9gdfj\") pod \"coredns-76f75df574-9skwb\" (UID: \"8c996f67-c276-45e6-864e-55e4231c520c\") " pod="kube-system/coredns-76f75df574-9skwb" Jul 2 07:54:20.631825 kubelet[2103]: I0702 07:54:20.631820 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5ebd62fe-ac31-46ea-b90a-1d75ce024bd1-config-volume\") pod \"coredns-76f75df574-2f6gv\" (UID: \"5ebd62fe-ac31-46ea-b90a-1d75ce024bd1\") " pod="kube-system/coredns-76f75df574-2f6gv" Jul 2 07:54:20.632001 kubelet[2103]: I0702 07:54:20.631863 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wt6kc\" (UniqueName: \"kubernetes.io/projected/5ebd62fe-ac31-46ea-b90a-1d75ce024bd1-kube-api-access-wt6kc\") pod \"coredns-76f75df574-2f6gv\" (UID: \"5ebd62fe-ac31-46ea-b90a-1d75ce024bd1\") " pod="kube-system/coredns-76f75df574-2f6gv" Jul 2 07:54:20.859930 env[1220]: time="2024-07-02T07:54:20.859858781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9skwb,Uid:8c996f67-c276-45e6-864e-55e4231c520c,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:20.875641 env[1220]: time="2024-07-02T07:54:20.875587076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68959dfc8c-clwzs,Uid:bddebf50-2327-45c6-95ff-420ceba20596,Namespace:calico-system,Attempt:0,}" Jul 2 07:54:20.886461 env[1220]: time="2024-07-02T07:54:20.886397315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2f6gv,Uid:5ebd62fe-ac31-46ea-b90a-1d75ce024bd1,Namespace:kube-system,Attempt:0,}" Jul 2 07:54:21.213275 env[1220]: time="2024-07-02T07:54:21.213113788Z" level=info msg="shim disconnected" id=2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e Jul 2 07:54:21.213275 env[1220]: time="2024-07-02T07:54:21.213201917Z" level=warning msg="cleaning up after shim disconnected" id=2f82920297b0d9c9f3ff75877088882ac94ee040532ab93a274462df9a57778e namespace=k8s.io Jul 2 07:54:21.213275 env[1220]: time="2024-07-02T07:54:21.213217678Z" level=info msg="cleaning up dead shim" Jul 2 07:54:21.237749 env[1220]: time="2024-07-02T07:54:21.237688242Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:54:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2788 runtime=io.containerd.runc.v2\n" Jul 2 07:54:21.390628 env[1220]: time="2024-07-02T07:54:21.390529029Z" level=error msg="Failed to destroy network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.391127 env[1220]: time="2024-07-02T07:54:21.391046938Z" level=error msg="encountered an error cleaning up failed sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.391279 env[1220]: time="2024-07-02T07:54:21.391161522Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9skwb,Uid:8c996f67-c276-45e6-864e-55e4231c520c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.391510 kubelet[2103]: E0702 07:54:21.391477 2103 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.392022 kubelet[2103]: E0702 07:54:21.391566 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-9skwb" Jul 2 07:54:21.392022 kubelet[2103]: E0702 07:54:21.391602 2103 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-9skwb" Jul 2 07:54:21.392022 kubelet[2103]: E0702 07:54:21.391684 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-9skwb_kube-system(8c996f67-c276-45e6-864e-55e4231c520c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-9skwb_kube-system(8c996f67-c276-45e6-864e-55e4231c520c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9skwb" podUID="8c996f67-c276-45e6-864e-55e4231c520c" Jul 2 07:54:21.408133 env[1220]: time="2024-07-02T07:54:21.408011262Z" level=error msg="Failed to destroy network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.408955 env[1220]: time="2024-07-02T07:54:21.408902692Z" level=error msg="encountered an error cleaning up failed sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.409216 env[1220]: time="2024-07-02T07:54:21.409168534Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2f6gv,Uid:5ebd62fe-ac31-46ea-b90a-1d75ce024bd1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.409642 kubelet[2103]: E0702 07:54:21.409593 2103 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.409763 kubelet[2103]: E0702 07:54:21.409660 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-2f6gv" Jul 2 07:54:21.409763 kubelet[2103]: E0702 07:54:21.409692 2103 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-2f6gv" Jul 2 07:54:21.409986 kubelet[2103]: E0702 07:54:21.409773 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-2f6gv_kube-system(5ebd62fe-ac31-46ea-b90a-1d75ce024bd1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-2f6gv_kube-system(5ebd62fe-ac31-46ea-b90a-1d75ce024bd1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-2f6gv" podUID="5ebd62fe-ac31-46ea-b90a-1d75ce024bd1" Jul 2 07:54:21.419933 env[1220]: time="2024-07-02T07:54:21.419853352Z" level=error msg="Failed to destroy network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.420379 env[1220]: time="2024-07-02T07:54:21.420327143Z" level=error msg="encountered an error cleaning up failed sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.420505 env[1220]: time="2024-07-02T07:54:21.420414075Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68959dfc8c-clwzs,Uid:bddebf50-2327-45c6-95ff-420ceba20596,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.420770 kubelet[2103]: E0702 07:54:21.420740 2103 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.420941 kubelet[2103]: E0702 07:54:21.420806 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68959dfc8c-clwzs" Jul 2 07:54:21.420941 kubelet[2103]: E0702 07:54:21.420841 2103 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68959dfc8c-clwzs" Jul 2 07:54:21.421299 kubelet[2103]: E0702 07:54:21.420991 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-68959dfc8c-clwzs_calico-system(bddebf50-2327-45c6-95ff-420ceba20596)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-68959dfc8c-clwzs_calico-system(bddebf50-2327-45c6-95ff-420ceba20596)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68959dfc8c-clwzs" podUID="bddebf50-2327-45c6-95ff-420ceba20596" Jul 2 07:54:21.509131 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6-shm.mount: Deactivated successfully. Jul 2 07:54:21.898109 systemd[1]: Created slice kubepods-besteffort-pod6c454dcc_a1d2_4ff3_8312_8135e3289602.slice. Jul 2 07:54:21.901740 env[1220]: time="2024-07-02T07:54:21.901677584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmmzc,Uid:6c454dcc-a1d2-4ff3-8312-8135e3289602,Namespace:calico-system,Attempt:0,}" Jul 2 07:54:21.993019 env[1220]: time="2024-07-02T07:54:21.992943899Z" level=error msg="Failed to destroy network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.996842 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9-shm.mount: Deactivated successfully. Jul 2 07:54:21.998482 env[1220]: time="2024-07-02T07:54:21.998403987Z" level=error msg="encountered an error cleaning up failed sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.998622 env[1220]: time="2024-07-02T07:54:21.998491788Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmmzc,Uid:6c454dcc-a1d2-4ff3-8312-8135e3289602,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.998831 kubelet[2103]: E0702 07:54:21.998789 2103 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:21.998948 kubelet[2103]: E0702 07:54:21.998881 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kmmzc" Jul 2 07:54:21.998948 kubelet[2103]: E0702 07:54:21.998920 2103 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kmmzc" Jul 2 07:54:21.999115 kubelet[2103]: E0702 07:54:21.999000 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kmmzc_calico-system(6c454dcc-a1d2-4ff3-8312-8135e3289602)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kmmzc_calico-system(6c454dcc-a1d2-4ff3-8312-8135e3289602)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kmmzc" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" Jul 2 07:54:22.054750 env[1220]: time="2024-07-02T07:54:22.054701494Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:54:22.055979 kubelet[2103]: I0702 07:54:22.055904 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:22.057382 env[1220]: time="2024-07-02T07:54:22.057341581Z" level=info msg="StopPodSandbox for \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\"" Jul 2 07:54:22.059928 kubelet[2103]: I0702 07:54:22.059184 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:22.060342 env[1220]: time="2024-07-02T07:54:22.060303120Z" level=info msg="StopPodSandbox for \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\"" Jul 2 07:54:22.063216 kubelet[2103]: I0702 07:54:22.062626 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:22.063533 env[1220]: time="2024-07-02T07:54:22.063497038Z" level=info msg="StopPodSandbox for \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\"" Jul 2 07:54:22.067618 kubelet[2103]: I0702 07:54:22.067035 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:22.068053 env[1220]: time="2024-07-02T07:54:22.068016353Z" level=info msg="StopPodSandbox for \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\"" Jul 2 07:54:22.175019 env[1220]: time="2024-07-02T07:54:22.173446698Z" level=error msg="StopPodSandbox for \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\" failed" error="failed to destroy network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:22.175980 kubelet[2103]: E0702 07:54:22.175623 2103 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:22.175980 kubelet[2103]: E0702 07:54:22.175763 2103 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0"} Jul 2 07:54:22.175980 kubelet[2103]: E0702 07:54:22.175848 2103 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ebd62fe-ac31-46ea-b90a-1d75ce024bd1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:54:22.175980 kubelet[2103]: E0702 07:54:22.175934 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ebd62fe-ac31-46ea-b90a-1d75ce024bd1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-2f6gv" podUID="5ebd62fe-ac31-46ea-b90a-1d75ce024bd1" Jul 2 07:54:22.182695 env[1220]: time="2024-07-02T07:54:22.182620861Z" level=error msg="StopPodSandbox for \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\" failed" error="failed to destroy network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:22.182958 kubelet[2103]: E0702 07:54:22.182930 2103 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:22.183116 kubelet[2103]: E0702 07:54:22.182989 2103 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6"} Jul 2 07:54:22.183116 kubelet[2103]: E0702 07:54:22.183046 2103 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8c996f67-c276-45e6-864e-55e4231c520c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:54:22.183116 kubelet[2103]: E0702 07:54:22.183104 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8c996f67-c276-45e6-864e-55e4231c520c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9skwb" podUID="8c996f67-c276-45e6-864e-55e4231c520c" Jul 2 07:54:22.193239 env[1220]: time="2024-07-02T07:54:22.193160590Z" level=error msg="StopPodSandbox for \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\" failed" error="failed to destroy network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:22.193818 kubelet[2103]: E0702 07:54:22.193772 2103 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:22.193957 kubelet[2103]: E0702 07:54:22.193847 2103 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9"} Jul 2 07:54:22.193957 kubelet[2103]: E0702 07:54:22.193929 2103 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c454dcc-a1d2-4ff3-8312-8135e3289602\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:54:22.194177 kubelet[2103]: E0702 07:54:22.193995 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c454dcc-a1d2-4ff3-8312-8135e3289602\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kmmzc" podUID="6c454dcc-a1d2-4ff3-8312-8135e3289602" Jul 2 07:54:22.195638 env[1220]: time="2024-07-02T07:54:22.195584441Z" level=error msg="StopPodSandbox for \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\" failed" error="failed to destroy network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:54:22.196012 kubelet[2103]: E0702 07:54:22.195976 2103 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:22.196182 kubelet[2103]: E0702 07:54:22.196023 2103 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29"} Jul 2 07:54:22.196182 kubelet[2103]: E0702 07:54:22.196093 2103 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bddebf50-2327-45c6-95ff-420ceba20596\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:54:22.196182 kubelet[2103]: E0702 07:54:22.196135 2103 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bddebf50-2327-45c6-95ff-420ceba20596\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68959dfc8c-clwzs" podUID="bddebf50-2327-45c6-95ff-420ceba20596" Jul 2 07:54:28.334351 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2868098320.mount: Deactivated successfully. Jul 2 07:54:28.368908 env[1220]: time="2024-07-02T07:54:28.368809050Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:28.372448 env[1220]: time="2024-07-02T07:54:28.372395485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:28.374848 env[1220]: time="2024-07-02T07:54:28.374797609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:28.377192 env[1220]: time="2024-07-02T07:54:28.377148353Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:28.377843 env[1220]: time="2024-07-02T07:54:28.377797926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:54:28.404388 env[1220]: time="2024-07-02T07:54:28.404307531Z" level=info msg="CreateContainer within sandbox \"e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:54:28.429690 env[1220]: time="2024-07-02T07:54:28.429622041Z" level=info msg="CreateContainer within sandbox \"e1531bda0ccc1d1242232742e18f9e2b63403396eaa95e9161540b0765755ee2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3defe04cf3a6fc22d741474653b7f2de41072d3efbd9d2525125fc1f725d920b\"" Jul 2 07:54:28.432491 env[1220]: time="2024-07-02T07:54:28.430574530Z" level=info msg="StartContainer for \"3defe04cf3a6fc22d741474653b7f2de41072d3efbd9d2525125fc1f725d920b\"" Jul 2 07:54:28.463186 systemd[1]: Started cri-containerd-3defe04cf3a6fc22d741474653b7f2de41072d3efbd9d2525125fc1f725d920b.scope. Jul 2 07:54:28.520135 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 07:54:28.520341 kernel: audit: type=1400 audit(1719906868.492:971): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.492000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.492000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f37581aec28 items=0 ppid=2527 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:28.553342 kernel: audit: type=1300 audit(1719906868.492:971): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f37581aec28 items=0 ppid=2527 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:28.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364656665303463663361366663323264373431343734363533623766 Jul 2 07:54:28.583251 kernel: audit: type=1327 audit(1719906868.492:971): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364656665303463663361366663323264373431343734363533623766 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.625843 kernel: audit: type=1400 audit(1719906868.498:972): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.626026 kernel: audit: type=1400 audit(1719906868.498:972): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.648094 kernel: audit: type=1400 audit(1719906868.498:972): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.658095 env[1220]: time="2024-07-02T07:54:28.658029386Z" level=info msg="StartContainer for \"3defe04cf3a6fc22d741474653b7f2de41072d3efbd9d2525125fc1f725d920b\" returns successfully" Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.690496 kernel: audit: type=1400 audit(1719906868.498:972): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.690668 kernel: audit: type=1400 audit(1719906868.498:972): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.711844 kernel: audit: type=1400 audit(1719906868.498:972): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.498000 audit: BPF prog-id=142 op=LOAD Jul 2 07:54:28.498000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b66b8 items=0 ppid=2527 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:28.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364656665303463663361366663323264373431343734363533623766 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.734131 kernel: audit: type=1400 audit(1719906868.498:972): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit: BPF prog-id=143 op=LOAD Jul 2 07:54:28.519000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b6708 items=0 ppid=2527 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:28.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364656665303463663361366663323264373431343734363533623766 Jul 2 07:54:28.519000 audit: BPF prog-id=143 op=UNLOAD Jul 2 07:54:28.519000 audit: BPF prog-id=142 op=UNLOAD Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:28.519000 audit: BPF prog-id=144 op=LOAD Jul 2 07:54:28.519000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b6798 items=0 ppid=2527 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:28.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364656665303463663361366663323264373431343734363533623766 Jul 2 07:54:28.803395 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:54:28.803552 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:54:29.121154 kubelet[2103]: I0702 07:54:29.118324 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-dqtq4" podStartSLOduration=2.087138344 podStartE2EDuration="20.118267738s" podCreationTimestamp="2024-07-02 07:54:09 +0000 UTC" firstStartedPulling="2024-07-02 07:54:10.34710148 +0000 UTC m=+22.730796937" lastFinishedPulling="2024-07-02 07:54:28.378230861 +0000 UTC m=+40.761926331" observedRunningTime="2024-07-02 07:54:29.11665635 +0000 UTC m=+41.500351834" watchObservedRunningTime="2024-07-02 07:54:29.118267738 +0000 UTC m=+41.501963221" Jul 2 07:54:30.119243 systemd[1]: run-containerd-runc-k8s.io-3defe04cf3a6fc22d741474653b7f2de41072d3efbd9d2525125fc1f725d920b-runc.8rG5no.mount: Deactivated successfully. Jul 2 07:54:30.396000 audit[3162]: AVC avc: denied { write } for pid=3162 comm="tee" name="fd" dev="proc" ino=24032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:30.396000 audit[3162]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9da8f9c9 a2=241 a3=1b6 items=1 ppid=3127 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.396000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:54:30.396000 audit: PATH item=0 name="/dev/fd/63" inode=24666 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:30.396000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:30.429000 audit[3181]: AVC avc: denied { write } for pid=3181 comm="tee" name="fd" dev="proc" ino=24046 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:30.443000 audit[3193]: AVC avc: denied { write } for pid=3193 comm="tee" name="fd" dev="proc" ino=24058 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:30.449000 audit[3191]: AVC avc: denied { write } for pid=3191 comm="tee" name="fd" dev="proc" ino=24061 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:30.449000 audit[3191]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8d5ee9b8 a2=241 a3=1b6 items=1 ppid=3128 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.450000 audit[3175]: AVC avc: denied { write } for pid=3175 comm="tee" name="fd" dev="proc" ino=24063 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:30.450000 audit[3175]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff35d4d9ca a2=241 a3=1b6 items=1 ppid=3124 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.450000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:54:30.450000 audit: PATH item=0 name="/dev/fd/63" inode=24027 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:30.450000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:30.452000 audit[3195]: AVC avc: denied { write } for pid=3195 comm="tee" name="fd" dev="proc" ino=24673 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:30.452000 audit[3195]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe32f559b9 a2=241 a3=1b6 items=1 ppid=3134 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.429000 audit[3181]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc3c339c8 a2=241 a3=1b6 items=1 ppid=3131 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.429000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:54:30.429000 audit: PATH item=0 name="/dev/fd/63" inode=24669 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:30.429000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:30.452000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:54:30.452000 audit: PATH item=0 name="/dev/fd/63" inode=24052 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:30.452000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:30.443000 audit[3193]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcface49c8 a2=241 a3=1b6 items=1 ppid=3123 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.443000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:54:30.443000 audit: PATH item=0 name="/dev/fd/63" inode=24051 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:30.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:30.460000 audit[3198]: AVC avc: denied { write } for pid=3198 comm="tee" name="fd" dev="proc" ino=24069 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:54:30.449000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:54:30.449000 audit: PATH item=0 name="/dev/fd/63" inode=24670 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:30.449000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:30.460000 audit[3198]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff13b89c8 a2=241 a3=1b6 items=1 ppid=3137 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.460000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:54:30.460000 audit: PATH item=0 name="/dev/fd/63" inode=24055 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:54:30.460000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:54:30.916426 systemd-networkd[1021]: vxlan.calico: Link UP Jul 2 07:54:30.916438 systemd-networkd[1021]: vxlan.calico: Gained carrier Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.952000 audit: BPF prog-id=145 op=LOAD Jul 2 07:54:30.952000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffed8894a30 a2=70 a3=7fb192ff9000 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.953000 audit: BPF prog-id=145 op=UNLOAD Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit: BPF prog-id=146 op=LOAD Jul 2 07:54:30.953000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffed8894a30 a2=70 a3=6f items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.953000 audit: BPF prog-id=146 op=UNLOAD Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffed88949e0 a2=70 a3=7ffed8894a30 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit: BPF prog-id=147 op=LOAD Jul 2 07:54:30.953000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffed88949c0 a2=70 a3=7ffed8894a30 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.953000 audit: BPF prog-id=147 op=UNLOAD Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed8894aa0 a2=70 a3=0 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed8894a90 a2=70 a3=0 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.953000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.953000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed8894a00 a2=70 a3=0 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.954000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.954000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffed8894ad0 a2=70 a3=d7a8b0 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffed8894ad0 a2=70 a3=d77880 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.955000 audit: BPF prog-id=148 op=LOAD Jul 2 07:54:30.955000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed88949f0 a2=70 a3=0 items=0 ppid=3138 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:54:30.962000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.962000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd64f2150 a2=70 a3=fff80800 items=0 ppid=3138 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.962000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:54:30.964000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:30.964000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd64f2020 a2=70 a3=3 items=0 ppid=3138 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:30.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:54:30.975000 audit: BPF prog-id=148 op=UNLOAD Jul 2 07:54:31.080000 audit[3290]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:31.080000 audit[3290]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd951bba00 a2=0 a3=7ffd951bb9ec items=0 ppid=3138 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:31.080000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:31.091000 audit[3289]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:31.091000 audit[3289]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7fffd78092e0 a2=0 a3=7fffd78092cc items=0 ppid=3138 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:31.091000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:31.102000 audit[3291]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:31.102000 audit[3291]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc85d74290 a2=0 a3=7ffc85d7427c items=0 ppid=3138 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:31.102000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:31.103000 audit[3292]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3292 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:31.103000 audit[3292]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc7fad2c60 a2=0 a3=7ffc7fad2c4c items=0 ppid=3138 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:31.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:32.255338 systemd-networkd[1021]: vxlan.calico: Gained IPv6LL Jul 2 07:54:35.893269 env[1220]: time="2024-07-02T07:54:35.891198637Z" level=info msg="StopPodSandbox for \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\"" Jul 2 07:54:35.893269 env[1220]: time="2024-07-02T07:54:35.891821639Z" level=info msg="StopPodSandbox for \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\"" Jul 2 07:54:35.893269 env[1220]: time="2024-07-02T07:54:35.893210490Z" level=info msg="StopPodSandbox for \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\"" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:35.990 [INFO][3347] k8s.go 608: Cleaning up netns ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:35.990 [INFO][3347] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" iface="eth0" netns="/var/run/netns/cni-3e13219f-c761-1c25-66d0-b69afa1ebe37" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:35.991 [INFO][3347] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" iface="eth0" netns="/var/run/netns/cni-3e13219f-c761-1c25-66d0-b69afa1ebe37" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:35.991 [INFO][3347] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" iface="eth0" netns="/var/run/netns/cni-3e13219f-c761-1c25-66d0-b69afa1ebe37" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:35.991 [INFO][3347] k8s.go 615: Releasing IP address(es) ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:35.991 [INFO][3347] utils.go 188: Calico CNI releasing IP address ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:36.042 [INFO][3366] ipam_plugin.go 411: Releasing address using handleID ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:36.042 [INFO][3366] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:36.042 [INFO][3366] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:36.052 [WARNING][3366] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:36.053 [INFO][3366] ipam_plugin.go 439: Releasing address using workloadID ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:36.056 [INFO][3366] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:36.065263 env[1220]: 2024-07-02 07:54:36.062 [INFO][3347] k8s.go 621: Teardown processing complete. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:36.074719 systemd[1]: run-netns-cni\x2d3e13219f\x2dc761\x2d1c25\x2d66d0\x2db69afa1ebe37.mount: Deactivated successfully. Jul 2 07:54:36.076530 env[1220]: time="2024-07-02T07:54:36.076474884Z" level=info msg="TearDown network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\" successfully" Jul 2 07:54:36.076705 env[1220]: time="2024-07-02T07:54:36.076676704Z" level=info msg="StopPodSandbox for \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\" returns successfully" Jul 2 07:54:36.082574 env[1220]: time="2024-07-02T07:54:36.081124353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmmzc,Uid:6c454dcc-a1d2-4ff3-8312-8135e3289602,Namespace:calico-system,Attempt:1,}" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.029 [INFO][3346] k8s.go 608: Cleaning up netns ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.029 [INFO][3346] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" iface="eth0" netns="/var/run/netns/cni-66237c5a-af14-64df-b950-8a9526bcf7d7" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.031 [INFO][3346] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" iface="eth0" netns="/var/run/netns/cni-66237c5a-af14-64df-b950-8a9526bcf7d7" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.031 [INFO][3346] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" iface="eth0" netns="/var/run/netns/cni-66237c5a-af14-64df-b950-8a9526bcf7d7" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.032 [INFO][3346] k8s.go 615: Releasing IP address(es) ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.032 [INFO][3346] utils.go 188: Calico CNI releasing IP address ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.099 [INFO][3373] ipam_plugin.go 411: Releasing address using handleID ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.101 [INFO][3373] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.102 [INFO][3373] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.133 [WARNING][3373] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.133 [INFO][3373] ipam_plugin.go 439: Releasing address using workloadID ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.136 [INFO][3373] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:36.142031 env[1220]: 2024-07-02 07:54:36.140 [INFO][3346] k8s.go 621: Teardown processing complete. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:36.147274 systemd[1]: run-netns-cni\x2d66237c5a\x2daf14\x2d64df\x2db950\x2d8a9526bcf7d7.mount: Deactivated successfully. Jul 2 07:54:36.149700 env[1220]: time="2024-07-02T07:54:36.149642781Z" level=info msg="TearDown network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\" successfully" Jul 2 07:54:36.149869 env[1220]: time="2024-07-02T07:54:36.149838548Z" level=info msg="StopPodSandbox for \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\" returns successfully" Jul 2 07:54:36.151109 env[1220]: time="2024-07-02T07:54:36.151033262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2f6gv,Uid:5ebd62fe-ac31-46ea-b90a-1d75ce024bd1,Namespace:kube-system,Attempt:1,}" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.079 [INFO][3359] k8s.go 608: Cleaning up netns ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.079 [INFO][3359] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" iface="eth0" netns="/var/run/netns/cni-394fe7f1-46b8-f289-ba8d-2cf0dc9a1054" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.080 [INFO][3359] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" iface="eth0" netns="/var/run/netns/cni-394fe7f1-46b8-f289-ba8d-2cf0dc9a1054" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.080 [INFO][3359] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" iface="eth0" netns="/var/run/netns/cni-394fe7f1-46b8-f289-ba8d-2cf0dc9a1054" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.080 [INFO][3359] k8s.go 615: Releasing IP address(es) ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.080 [INFO][3359] utils.go 188: Calico CNI releasing IP address ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.201 [INFO][3379] ipam_plugin.go 411: Releasing address using handleID ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.203 [INFO][3379] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.206 [INFO][3379] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.216 [WARNING][3379] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.216 [INFO][3379] ipam_plugin.go 439: Releasing address using workloadID ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.227 [INFO][3379] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:36.231401 env[1220]: 2024-07-02 07:54:36.228 [INFO][3359] k8s.go 621: Teardown processing complete. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:36.232765 env[1220]: time="2024-07-02T07:54:36.232697314Z" level=info msg="TearDown network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\" successfully" Jul 2 07:54:36.232955 env[1220]: time="2024-07-02T07:54:36.232918588Z" level=info msg="StopPodSandbox for \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\" returns successfully" Jul 2 07:54:36.234274 env[1220]: time="2024-07-02T07:54:36.234234286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68959dfc8c-clwzs,Uid:bddebf50-2327-45c6-95ff-420ceba20596,Namespace:calico-system,Attempt:1,}" Jul 2 07:54:36.449411 systemd-networkd[1021]: cali8ff5c7730bd: Link UP Jul 2 07:54:36.461907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:54:36.462095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ff5c7730bd: link becomes ready Jul 2 07:54:36.467598 systemd-networkd[1021]: cali8ff5c7730bd: Gained carrier Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.291 [INFO][3387] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0 csi-node-driver- calico-system 6c454dcc-a1d2-4ff3-8312-8135e3289602 692 0 2024-07-02 07:54:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal csi-node-driver-kmmzc eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali8ff5c7730bd [] []}} ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Namespace="calico-system" Pod="csi-node-driver-kmmzc" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.292 [INFO][3387] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Namespace="calico-system" Pod="csi-node-driver-kmmzc" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.376 [INFO][3429] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" HandleID="k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.395 [INFO][3429] ipam_plugin.go 264: Auto assigning IP ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" HandleID="k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a2e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", "pod":"csi-node-driver-kmmzc", "timestamp":"2024-07-02 07:54:36.375101405 +0000 UTC"}, Hostname:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.395 [INFO][3429] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.395 [INFO][3429] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.396 [INFO][3429] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal' Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.398 [INFO][3429] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.404 [INFO][3429] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.409 [INFO][3429] ipam.go 489: Trying affinity for 192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.411 [INFO][3429] ipam.go 155: Attempting to load block cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.414 [INFO][3429] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.414 [INFO][3429] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.192/26 handle="k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.416 [INFO][3429] ipam.go 1685: Creating new handle: k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.422 [INFO][3429] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.192/26 handle="k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.430 [INFO][3429] ipam.go 1216: Successfully claimed IPs: [192.168.98.193/26] block=192.168.98.192/26 handle="k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.430 [INFO][3429] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.193/26] handle="k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.431 [INFO][3429] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:36.504250 env[1220]: 2024-07-02 07:54:36.431 [INFO][3429] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.98.193/26] IPv6=[] ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" HandleID="k8s-pod-network.68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.505518 env[1220]: 2024-07-02 07:54:36.438 [INFO][3387] k8s.go 386: Populated endpoint ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Namespace="calico-system" Pod="csi-node-driver-kmmzc" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6c454dcc-a1d2-4ff3-8312-8135e3289602", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-kmmzc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8ff5c7730bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:36.505518 env[1220]: 2024-07-02 07:54:36.439 [INFO][3387] k8s.go 387: Calico CNI using IPs: [192.168.98.193/32] ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Namespace="calico-system" Pod="csi-node-driver-kmmzc" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.505518 env[1220]: 2024-07-02 07:54:36.439 [INFO][3387] dataplane_linux.go 68: Setting the host side veth name to cali8ff5c7730bd ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Namespace="calico-system" Pod="csi-node-driver-kmmzc" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.505518 env[1220]: 2024-07-02 07:54:36.469 [INFO][3387] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Namespace="calico-system" Pod="csi-node-driver-kmmzc" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.505518 env[1220]: 2024-07-02 07:54:36.470 [INFO][3387] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Namespace="calico-system" Pod="csi-node-driver-kmmzc" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6c454dcc-a1d2-4ff3-8312-8135e3289602", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad", Pod:"csi-node-driver-kmmzc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8ff5c7730bd", MAC:"c6:91:b1:37:8f:bc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:36.505518 env[1220]: 2024-07-02 07:54:36.495 [INFO][3387] k8s.go 500: Wrote updated endpoint to datastore ContainerID="68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad" Namespace="calico-system" Pod="csi-node-driver-kmmzc" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:36.540293 systemd-networkd[1021]: cali4a1daf8782f: Link UP Jul 2 07:54:36.546224 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4a1daf8782f: link becomes ready Jul 2 07:54:36.546924 systemd-networkd[1021]: cali4a1daf8782f: Gained carrier Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.315 [INFO][3400] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0 coredns-76f75df574- kube-system 5ebd62fe-ac31-46ea-b90a-1d75ce024bd1 693 0 2024-07-02 07:54:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal coredns-76f75df574-2f6gv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4a1daf8782f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Namespace="kube-system" Pod="coredns-76f75df574-2f6gv" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.315 [INFO][3400] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Namespace="kube-system" Pod="coredns-76f75df574-2f6gv" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.425 [INFO][3434] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" HandleID="k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.444 [INFO][3434] ipam_plugin.go 264: Auto assigning IP ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" HandleID="k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ffec0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", "pod":"coredns-76f75df574-2f6gv", "timestamp":"2024-07-02 07:54:36.425347128 +0000 UTC"}, Hostname:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.444 [INFO][3434] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.444 [INFO][3434] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.444 [INFO][3434] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal' Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.448 [INFO][3434] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.468 [INFO][3434] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.483 [INFO][3434] ipam.go 489: Trying affinity for 192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.496 [INFO][3434] ipam.go 155: Attempting to load block cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.499 [INFO][3434] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.500 [INFO][3434] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.192/26 handle="k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.504 [INFO][3434] ipam.go 1685: Creating new handle: k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4 Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.516 [INFO][3434] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.192/26 handle="k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.530 [INFO][3434] ipam.go 1216: Successfully claimed IPs: [192.168.98.194/26] block=192.168.98.192/26 handle="k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.530 [INFO][3434] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.194/26] handle="k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.530 [INFO][3434] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:36.572421 env[1220]: 2024-07-02 07:54:36.530 [INFO][3434] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.98.194/26] IPv6=[] ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" HandleID="k8s-pod-network.d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.573841 env[1220]: 2024-07-02 07:54:36.533 [INFO][3400] k8s.go 386: Populated endpoint ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Namespace="kube-system" Pod="coredns-76f75df574-2f6gv" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5ebd62fe-ac31-46ea-b90a-1d75ce024bd1", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-76f75df574-2f6gv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4a1daf8782f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:36.573841 env[1220]: 2024-07-02 07:54:36.534 [INFO][3400] k8s.go 387: Calico CNI using IPs: [192.168.98.194/32] ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Namespace="kube-system" Pod="coredns-76f75df574-2f6gv" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.573841 env[1220]: 2024-07-02 07:54:36.534 [INFO][3400] dataplane_linux.go 68: Setting the host side veth name to cali4a1daf8782f ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Namespace="kube-system" Pod="coredns-76f75df574-2f6gv" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.573841 env[1220]: 2024-07-02 07:54:36.547 [INFO][3400] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Namespace="kube-system" Pod="coredns-76f75df574-2f6gv" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.573841 env[1220]: 2024-07-02 07:54:36.547 [INFO][3400] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Namespace="kube-system" Pod="coredns-76f75df574-2f6gv" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5ebd62fe-ac31-46ea-b90a-1d75ce024bd1", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4", Pod:"coredns-76f75df574-2f6gv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4a1daf8782f", MAC:"06:2d:35:d0:99:c1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:36.573841 env[1220]: 2024-07-02 07:54:36.570 [INFO][3400] k8s.go 500: Wrote updated endpoint to datastore ContainerID="d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4" Namespace="kube-system" Pod="coredns-76f75df574-2f6gv" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:36.607449 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 07:54:36.607612 kernel: audit: type=1325 audit(1719906876.584:1004): table=filter:101 family=2 entries=34 op=nft_register_chain pid=3461 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:36.584000 audit[3461]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3461 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:36.584000 audit[3461]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdcc0b06c0 a2=0 a3=7ffdcc0b06ac items=0 ppid=3138 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.631685 env[1220]: time="2024-07-02T07:54:36.627595071Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:36.631685 env[1220]: time="2024-07-02T07:54:36.627698409Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:36.631685 env[1220]: time="2024-07-02T07:54:36.627738544Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:36.631685 env[1220]: time="2024-07-02T07:54:36.627977333Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad pid=3482 runtime=io.containerd.runc.v2 Jul 2 07:54:36.658439 kernel: audit: type=1300 audit(1719906876.584:1004): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdcc0b06c0 a2=0 a3=7ffdcc0b06ac items=0 ppid=3138 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.677017 systemd[1]: Started cri-containerd-68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad.scope. Jul 2 07:54:36.584000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:36.696163 env[1220]: time="2024-07-02T07:54:36.693034489Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:36.696436 env[1220]: time="2024-07-02T07:54:36.696387253Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:36.696599 env[1220]: time="2024-07-02T07:54:36.696568172Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:36.696968 env[1220]: time="2024-07-02T07:54:36.696924713Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4 pid=3509 runtime=io.containerd.runc.v2 Jul 2 07:54:36.703162 kernel: audit: type=1327 audit(1719906876.584:1004): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:36.730601 systemd[1]: Started cri-containerd-d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4.scope. Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.761266 kernel: audit: type=1400 audit(1719906876.738:1005): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.789101 kernel: audit: type=1400 audit(1719906876.738:1006): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.814088 kernel: audit: type=1400 audit(1719906876.738:1007): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.814169 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:54:36.847919 kernel: audit: type=1400 audit(1719906876.738:1008): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.848110 kernel: audit: audit_lost=33 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:54:36.848147 kernel: audit: type=1400 audit(1719906876.738:1009): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.759000 audit: BPF prog-id=149 op=LOAD Jul 2 07:54:36.761000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.761000 audit[3490]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3482 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323831623864353036646635343762353339363861363666386634 Jul 2 07:54:36.761000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.761000 audit[3490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3482 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323831623864353036646635343762353339363861363666386634 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit: BPF prog-id=150 op=LOAD Jul 2 07:54:36.762000 audit[3490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000246f0 items=0 ppid=3482 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323831623864353036646635343762353339363861363666386634 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit: BPF prog-id=151 op=LOAD Jul 2 07:54:36.762000 audit[3490]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024738 items=0 ppid=3482 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323831623864353036646635343762353339363861363666386634 Jul 2 07:54:36.762000 audit: BPF prog-id=151 op=UNLOAD Jul 2 07:54:36.762000 audit: BPF prog-id=150 op=UNLOAD Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { perfmon } for pid=3490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit[3490]: AVC avc: denied { bpf } for pid=3490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.762000 audit: BPF prog-id=152 op=LOAD Jul 2 07:54:36.762000 audit[3490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024b48 items=0 ppid=3482 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323831623864353036646635343762353339363861363666386634 Jul 2 07:54:36.772000 audit[3535]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3535 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:36.772000 audit[3535]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff0ee9f6c0 a2=0 a3=7fff0ee9f6ac items=0 ppid=3138 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.772000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:36.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.880892 systemd-networkd[1021]: cali0af3726daa9: Link UP Jul 2 07:54:36.892537 env[1220]: time="2024-07-02T07:54:36.891584487Z" level=info msg="StopPodSandbox for \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\"" Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3509 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363234316238633562346562316339303333666432376537636365 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3509 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363234316238633562346562316339303333666432376537636365 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.891000 audit: BPF prog-id=154 op=LOAD Jul 2 07:54:36.891000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dba40 items=0 ppid=3509 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363234316238633562346562316339303333666432376537636365 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit: BPF prog-id=155 op=LOAD Jul 2 07:54:36.892000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dba88 items=0 ppid=3509 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363234316238633562346562316339303333666432376537636365 Jul 2 07:54:36.892000 audit: BPF prog-id=155 op=UNLOAD Jul 2 07:54:36.892000 audit: BPF prog-id=154 op=UNLOAD Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:36.892000 audit: BPF prog-id=156 op=LOAD Jul 2 07:54:36.892000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dbe98 items=0 ppid=3509 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363234316238633562346562316339303333666432376537636365 Jul 2 07:54:36.909425 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0af3726daa9: link becomes ready Jul 2 07:54:36.906753 systemd-networkd[1021]: cali0af3726daa9: Gained carrier Jul 2 07:54:36.924782 env[1220]: time="2024-07-02T07:54:36.924726456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmmzc,Uid:6c454dcc-a1d2-4ff3-8312-8135e3289602,Namespace:calico-system,Attempt:1,} returns sandbox id \"68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad\"" Jul 2 07:54:36.927739 env[1220]: time="2024-07-02T07:54:36.927701369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.354 [INFO][3416] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0 calico-kube-controllers-68959dfc8c- calico-system bddebf50-2327-45c6-95ff-420ceba20596 694 0 2024-07-02 07:54:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:68959dfc8c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal calico-kube-controllers-68959dfc8c-clwzs eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali0af3726daa9 [] []}} ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Namespace="calico-system" Pod="calico-kube-controllers-68959dfc8c-clwzs" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.354 [INFO][3416] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Namespace="calico-system" Pod="calico-kube-controllers-68959dfc8c-clwzs" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.595 [INFO][3439] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" HandleID="k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.657 [INFO][3439] ipam_plugin.go 264: Auto assigning IP ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" HandleID="k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ca4d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", "pod":"calico-kube-controllers-68959dfc8c-clwzs", "timestamp":"2024-07-02 07:54:36.595114345 +0000 UTC"}, Hostname:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.657 [INFO][3439] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.657 [INFO][3439] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.657 [INFO][3439] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal' Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.662 [INFO][3439] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.708 [INFO][3439] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.718 [INFO][3439] ipam.go 489: Trying affinity for 192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.722 [INFO][3439] ipam.go 155: Attempting to load block cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.726 [INFO][3439] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.726 [INFO][3439] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.192/26 handle="k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.733 [INFO][3439] ipam.go 1685: Creating new handle: k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10 Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.762 [INFO][3439] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.192/26 handle="k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.793 [INFO][3439] ipam.go 1216: Successfully claimed IPs: [192.168.98.195/26] block=192.168.98.192/26 handle="k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.793 [INFO][3439] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.195/26] handle="k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.793 [INFO][3439] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:36.931823 env[1220]: 2024-07-02 07:54:36.793 [INFO][3439] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.98.195/26] IPv6=[] ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" HandleID="k8s-pod-network.9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.939384 env[1220]: 2024-07-02 07:54:36.848 [INFO][3416] k8s.go 386: Populated endpoint ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Namespace="calico-system" Pod="calico-kube-controllers-68959dfc8c-clwzs" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0", GenerateName:"calico-kube-controllers-68959dfc8c-", Namespace:"calico-system", SelfLink:"", UID:"bddebf50-2327-45c6-95ff-420ceba20596", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68959dfc8c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-68959dfc8c-clwzs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.98.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0af3726daa9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:36.939384 env[1220]: 2024-07-02 07:54:36.848 [INFO][3416] k8s.go 387: Calico CNI using IPs: [192.168.98.195/32] ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Namespace="calico-system" Pod="calico-kube-controllers-68959dfc8c-clwzs" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.939384 env[1220]: 2024-07-02 07:54:36.849 [INFO][3416] dataplane_linux.go 68: Setting the host side veth name to cali0af3726daa9 ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Namespace="calico-system" Pod="calico-kube-controllers-68959dfc8c-clwzs" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.939384 env[1220]: 2024-07-02 07:54:36.892 [INFO][3416] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Namespace="calico-system" Pod="calico-kube-controllers-68959dfc8c-clwzs" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.939384 env[1220]: 2024-07-02 07:54:36.909 [INFO][3416] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Namespace="calico-system" Pod="calico-kube-controllers-68959dfc8c-clwzs" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0", GenerateName:"calico-kube-controllers-68959dfc8c-", Namespace:"calico-system", SelfLink:"", UID:"bddebf50-2327-45c6-95ff-420ceba20596", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68959dfc8c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10", Pod:"calico-kube-controllers-68959dfc8c-clwzs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.98.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0af3726daa9", MAC:"3e:cc:23:61:53:2e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:36.939384 env[1220]: 2024-07-02 07:54:36.926 [INFO][3416] k8s.go 500: Wrote updated endpoint to datastore ContainerID="9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10" Namespace="calico-system" Pod="calico-kube-controllers-68959dfc8c-clwzs" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:36.964000 audit[3581]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3581 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:36.964000 audit[3581]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7fffa4ca7940 a2=0 a3=7fffa4ca792c items=0 ppid=3138 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:36.964000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:37.009890 env[1220]: time="2024-07-02T07:54:37.002687966Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:37.009890 env[1220]: time="2024-07-02T07:54:37.002739866Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:37.009890 env[1220]: time="2024-07-02T07:54:37.002758377Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:37.009890 env[1220]: time="2024-07-02T07:54:37.002947134Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10 pid=3602 runtime=io.containerd.runc.v2 Jul 2 07:54:37.011871 env[1220]: time="2024-07-02T07:54:37.011812152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2f6gv,Uid:5ebd62fe-ac31-46ea-b90a-1d75ce024bd1,Namespace:kube-system,Attempt:1,} returns sandbox id \"d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4\"" Jul 2 07:54:37.020315 env[1220]: time="2024-07-02T07:54:37.020263360Z" level=info msg="CreateContainer within sandbox \"d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:54:37.064981 systemd[1]: Started cri-containerd-9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10.scope. Jul 2 07:54:37.084384 systemd[1]: run-netns-cni\x2d394fe7f1\x2d46b8\x2df289\x2dba8d\x2d2cf0dc9a1054.mount: Deactivated successfully. Jul 2 07:54:37.110906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3578015333.mount: Deactivated successfully. Jul 2 07:54:37.124427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1533424782.mount: Deactivated successfully. Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.144000 audit: BPF prog-id=157 op=LOAD Jul 2 07:54:37.145000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.145000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3602 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962643737623036306133633839343035386532316365656566646163 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3602 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962643737623036306133633839343035386532316365656566646163 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148170 env[1220]: time="2024-07-02T07:54:37.148113600Z" level=info msg="CreateContainer within sandbox \"d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6aff6adfa1fb4eff0c5eb628268f273039806dd6e37135ac90951b26cb9f3315\"" Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.146000 audit: BPF prog-id=158 op=LOAD Jul 2 07:54:37.146000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a9980 items=0 ppid=3602 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962643737623036306133633839343035386532316365656566646163 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.148000 audit: BPF prog-id=159 op=LOAD Jul 2 07:54:37.148000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a99c8 items=0 ppid=3602 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962643737623036306133633839343035386532316365656566646163 Jul 2 07:54:37.149000 audit: BPF prog-id=159 op=UNLOAD Jul 2 07:54:37.153000 audit: BPF prog-id=158 op=UNLOAD Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.153000 audit: BPF prog-id=160 op=LOAD Jul 2 07:54:37.153000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a9dd8 items=0 ppid=3602 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962643737623036306133633839343035386532316365656566646163 Jul 2 07:54:37.160575 env[1220]: time="2024-07-02T07:54:37.160261334Z" level=info msg="StartContainer for \"6aff6adfa1fb4eff0c5eb628268f273039806dd6e37135ac90951b26cb9f3315\"" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.054 [INFO][3580] k8s.go 608: Cleaning up netns ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.054 [INFO][3580] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" iface="eth0" netns="/var/run/netns/cni-6e4b0845-0995-2583-bbe6-0f14d4830e14" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.054 [INFO][3580] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" iface="eth0" netns="/var/run/netns/cni-6e4b0845-0995-2583-bbe6-0f14d4830e14" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.054 [INFO][3580] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" iface="eth0" netns="/var/run/netns/cni-6e4b0845-0995-2583-bbe6-0f14d4830e14" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.055 [INFO][3580] k8s.go 615: Releasing IP address(es) ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.055 [INFO][3580] utils.go 188: Calico CNI releasing IP address ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.171 [INFO][3623] ipam_plugin.go 411: Releasing address using handleID ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.171 [INFO][3623] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.171 [INFO][3623] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.187 [WARNING][3623] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.187 [INFO][3623] ipam_plugin.go 439: Releasing address using workloadID ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.191 [INFO][3623] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:37.195404 env[1220]: 2024-07-02 07:54:37.193 [INFO][3580] k8s.go 621: Teardown processing complete. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:37.196182 env[1220]: time="2024-07-02T07:54:37.195587717Z" level=info msg="TearDown network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\" successfully" Jul 2 07:54:37.196182 env[1220]: time="2024-07-02T07:54:37.195635017Z" level=info msg="StopPodSandbox for \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\" returns successfully" Jul 2 07:54:37.196793 env[1220]: time="2024-07-02T07:54:37.196742449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9skwb,Uid:8c996f67-c276-45e6-864e-55e4231c520c,Namespace:kube-system,Attempt:1,}" Jul 2 07:54:37.225071 systemd[1]: Started cri-containerd-6aff6adfa1fb4eff0c5eb628268f273039806dd6e37135ac90951b26cb9f3315.scope. Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.259000 audit: BPF prog-id=161 op=LOAD Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3509 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661666636616466613166623465666630633565623632383236386632 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3509 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661666636616466613166623465666630633565623632383236386632 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit: BPF prog-id=162 op=LOAD Jul 2 07:54:37.260000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000428e40 items=0 ppid=3509 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661666636616466613166623465666630633565623632383236386632 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit: BPF prog-id=163 op=LOAD Jul 2 07:54:37.260000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000428e88 items=0 ppid=3509 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661666636616466613166623465666630633565623632383236386632 Jul 2 07:54:37.260000 audit: BPF prog-id=163 op=UNLOAD Jul 2 07:54:37.260000 audit: BPF prog-id=162 op=UNLOAD Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.260000 audit: BPF prog-id=164 op=LOAD Jul 2 07:54:37.260000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000429298 items=0 ppid=3509 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661666636616466613166623465666630633565623632383236386632 Jul 2 07:54:37.274045 env[1220]: time="2024-07-02T07:54:37.273990715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68959dfc8c-clwzs,Uid:bddebf50-2327-45c6-95ff-420ceba20596,Namespace:calico-system,Attempt:1,} returns sandbox id \"9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10\"" Jul 2 07:54:37.292437 env[1220]: time="2024-07-02T07:54:37.292373072Z" level=info msg="StartContainer for \"6aff6adfa1fb4eff0c5eb628268f273039806dd6e37135ac90951b26cb9f3315\" returns successfully" Jul 2 07:54:37.445987 systemd-networkd[1021]: calieec6129115c: Link UP Jul 2 07:54:37.455715 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieec6129115c: link becomes ready Jul 2 07:54:37.456026 systemd-networkd[1021]: calieec6129115c: Gained carrier Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.330 [INFO][3657] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0 coredns-76f75df574- kube-system 8c996f67-c276-45e6-864e-55e4231c520c 710 0 2024-07-02 07:54:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal coredns-76f75df574-9skwb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calieec6129115c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Namespace="kube-system" Pod="coredns-76f75df574-9skwb" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.336 [INFO][3657] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Namespace="kube-system" Pod="coredns-76f75df574-9skwb" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.386 [INFO][3692] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" HandleID="k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.400 [INFO][3692] ipam_plugin.go 264: Auto assigning IP ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" HandleID="k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031c2e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", "pod":"coredns-76f75df574-9skwb", "timestamp":"2024-07-02 07:54:37.386960056 +0000 UTC"}, Hostname:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.400 [INFO][3692] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.400 [INFO][3692] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.400 [INFO][3692] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal' Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.403 [INFO][3692] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.412 [INFO][3692] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.417 [INFO][3692] ipam.go 489: Trying affinity for 192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.419 [INFO][3692] ipam.go 155: Attempting to load block cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.423 [INFO][3692] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.423 [INFO][3692] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.192/26 handle="k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.425 [INFO][3692] ipam.go 1685: Creating new handle: k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.429 [INFO][3692] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.192/26 handle="k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.435 [INFO][3692] ipam.go 1216: Successfully claimed IPs: [192.168.98.196/26] block=192.168.98.192/26 handle="k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.435 [INFO][3692] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.196/26] handle="k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.435 [INFO][3692] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:37.477668 env[1220]: 2024-07-02 07:54:37.435 [INFO][3692] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.98.196/26] IPv6=[] ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" HandleID="k8s-pod-network.1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.478913 env[1220]: 2024-07-02 07:54:37.438 [INFO][3657] k8s.go 386: Populated endpoint ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Namespace="kube-system" Pod="coredns-76f75df574-9skwb" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8c996f67-c276-45e6-864e-55e4231c520c", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-76f75df574-9skwb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieec6129115c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:37.478913 env[1220]: 2024-07-02 07:54:37.438 [INFO][3657] k8s.go 387: Calico CNI using IPs: [192.168.98.196/32] ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Namespace="kube-system" Pod="coredns-76f75df574-9skwb" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.478913 env[1220]: 2024-07-02 07:54:37.439 [INFO][3657] dataplane_linux.go 68: Setting the host side veth name to calieec6129115c ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Namespace="kube-system" Pod="coredns-76f75df574-9skwb" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.478913 env[1220]: 2024-07-02 07:54:37.463 [INFO][3657] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Namespace="kube-system" Pod="coredns-76f75df574-9skwb" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.478913 env[1220]: 2024-07-02 07:54:37.463 [INFO][3657] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Namespace="kube-system" Pod="coredns-76f75df574-9skwb" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8c996f67-c276-45e6-864e-55e4231c520c", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f", Pod:"coredns-76f75df574-9skwb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieec6129115c", MAC:"d6:d9:21:4f:b6:0f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:37.478913 env[1220]: 2024-07-02 07:54:37.474 [INFO][3657] k8s.go 500: Wrote updated endpoint to datastore ContainerID="1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f" Namespace="kube-system" Pod="coredns-76f75df574-9skwb" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:37.504280 env[1220]: time="2024-07-02T07:54:37.504195507Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:54:37.504548 env[1220]: time="2024-07-02T07:54:37.504508518Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:54:37.504700 env[1220]: time="2024-07-02T07:54:37.504666766Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:54:37.505164 env[1220]: time="2024-07-02T07:54:37.505106666Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f pid=3718 runtime=io.containerd.runc.v2 Jul 2 07:54:37.529285 systemd[1]: Started cri-containerd-1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f.scope. Jul 2 07:54:37.549000 audit[3737]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=3737 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:54:37.549000 audit[3737]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffd261107e0 a2=0 a3=7ffd261107cc items=0 ppid=3138 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.549000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.552000 audit: BPF prog-id=165 op=LOAD Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3718 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383131633130626261356462363362663732386633316636353833 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3718 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383131633130626261356462363362663732386633316636353833 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit: BPF prog-id=166 op=LOAD Jul 2 07:54:37.553000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00030a930 items=0 ppid=3718 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383131633130626261356462363362663732386633316636353833 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit: BPF prog-id=167 op=LOAD Jul 2 07:54:37.553000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00030a978 items=0 ppid=3718 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383131633130626261356462363362663732386633316636353833 Jul 2 07:54:37.553000 audit: BPF prog-id=167 op=UNLOAD Jul 2 07:54:37.553000 audit: BPF prog-id=166 op=UNLOAD Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.553000 audit: BPF prog-id=168 op=LOAD Jul 2 07:54:37.553000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00030ad88 items=0 ppid=3718 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383131633130626261356462363362663732386633316636353833 Jul 2 07:54:37.601271 env[1220]: time="2024-07-02T07:54:37.601221141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9skwb,Uid:8c996f67-c276-45e6-864e-55e4231c520c,Namespace:kube-system,Attempt:1,} returns sandbox id \"1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f\"" Jul 2 07:54:37.606040 env[1220]: time="2024-07-02T07:54:37.605954692Z" level=info msg="CreateContainer within sandbox \"1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:54:37.624640 env[1220]: time="2024-07-02T07:54:37.624573314Z" level=info msg="CreateContainer within sandbox \"1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"521261c3edf3435d480abb9d2b6c5770eff3cd56af0c06aea4bb7f59ba7d0a5a\"" Jul 2 07:54:37.626953 env[1220]: time="2024-07-02T07:54:37.625407961Z" level=info msg="StartContainer for \"521261c3edf3435d480abb9d2b6c5770eff3cd56af0c06aea4bb7f59ba7d0a5a\"" Jul 2 07:54:37.651676 systemd[1]: Started cri-containerd-521261c3edf3435d480abb9d2b6c5770eff3cd56af0c06aea4bb7f59ba7d0a5a.scope. Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.674000 audit: BPF prog-id=169 op=LOAD Jul 2 07:54:37.674000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.674000 audit[3762]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3718 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313236316333656466333433356434383061626239643262366335 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3718 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313236316333656466333433356434383061626239643262366335 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit: BPF prog-id=170 op=LOAD Jul 2 07:54:37.675000 audit[3762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009c3a0 items=0 ppid=3718 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313236316333656466333433356434383061626239643262366335 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit: BPF prog-id=171 op=LOAD Jul 2 07:54:37.675000 audit[3762]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009c3e8 items=0 ppid=3718 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313236316333656466333433356434383061626239643262366335 Jul 2 07:54:37.675000 audit: BPF prog-id=171 op=UNLOAD Jul 2 07:54:37.675000 audit: BPF prog-id=170 op=UNLOAD Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:37.675000 audit: BPF prog-id=172 op=LOAD Jul 2 07:54:37.675000 audit[3762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009c7f8 items=0 ppid=3718 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:37.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313236316333656466333433356434383061626239643262366335 Jul 2 07:54:37.699978 env[1220]: time="2024-07-02T07:54:37.696559543Z" level=info msg="StartContainer for \"521261c3edf3435d480abb9d2b6c5770eff3cd56af0c06aea4bb7f59ba7d0a5a\" returns successfully" Jul 2 07:54:37.823371 systemd-networkd[1021]: cali8ff5c7730bd: Gained IPv6LL Jul 2 07:54:38.081010 systemd[1]: run-netns-cni\x2d6e4b0845\x2d0995\x2d2583\x2dbbe6\x2d0f14d4830e14.mount: Deactivated successfully. Jul 2 07:54:38.081585 env[1220]: time="2024-07-02T07:54:38.081521980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:38.086762 env[1220]: time="2024-07-02T07:54:38.086714190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:38.090447 env[1220]: time="2024-07-02T07:54:38.090394149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:38.093542 env[1220]: time="2024-07-02T07:54:38.093498373Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:38.094278 env[1220]: time="2024-07-02T07:54:38.094234545Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:54:38.096685 env[1220]: time="2024-07-02T07:54:38.096652127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 07:54:38.099228 env[1220]: time="2024-07-02T07:54:38.099180364Z" level=info msg="CreateContainer within sandbox \"68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:54:38.123544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4087527147.mount: Deactivated successfully. Jul 2 07:54:38.130435 env[1220]: time="2024-07-02T07:54:38.130352052Z" level=info msg="CreateContainer within sandbox \"68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9792072cde5ed34b43c82539f057d9372f7e1927c8412a75171a4698e376c78a\"" Jul 2 07:54:38.135558 env[1220]: time="2024-07-02T07:54:38.134319187Z" level=info msg="StartContainer for \"9792072cde5ed34b43c82539f057d9372f7e1927c8412a75171a4698e376c78a\"" Jul 2 07:54:38.179166 systemd[1]: Started cri-containerd-9792072cde5ed34b43c82539f057d9372f7e1927c8412a75171a4698e376c78a.scope. Jul 2 07:54:38.220915 kubelet[2103]: I0702 07:54:38.220870 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-2f6gv" podStartSLOduration=35.220810303 podStartE2EDuration="35.220810303s" podCreationTimestamp="2024-07-02 07:54:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:38.217745598 +0000 UTC m=+50.601441079" watchObservedRunningTime="2024-07-02 07:54:38.220810303 +0000 UTC m=+50.604505786" Jul 2 07:54:38.243996 kubelet[2103]: I0702 07:54:38.243951 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-9skwb" podStartSLOduration=35.243894731 podStartE2EDuration="35.243894731s" podCreationTimestamp="2024-07-02 07:54:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:54:38.240707593 +0000 UTC m=+50.624403083" watchObservedRunningTime="2024-07-02 07:54:38.243894731 +0000 UTC m=+50.627590213" Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f3481f627c8 items=0 ppid=3482 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937393230373263646535656433346234336338323533396630353764 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.248000 audit: BPF prog-id=173 op=LOAD Jul 2 07:54:38.248000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032fee8 items=0 ppid=3482 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937393230373263646535656433346234336338323533396630353764 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.249000 audit: BPF prog-id=174 op=LOAD Jul 2 07:54:38.249000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032ff38 items=0 ppid=3482 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937393230373263646535656433346234336338323533396630353764 Jul 2 07:54:38.251000 audit: BPF prog-id=174 op=UNLOAD Jul 2 07:54:38.251000 audit: BPF prog-id=173 op=UNLOAD Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:38.251000 audit: BPF prog-id=175 op=LOAD Jul 2 07:54:38.251000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032ffc8 items=0 ppid=3482 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937393230373263646535656433346234336338323533396630353764 Jul 2 07:54:38.298879 env[1220]: time="2024-07-02T07:54:38.298822208Z" level=info msg="StartContainer for \"9792072cde5ed34b43c82539f057d9372f7e1927c8412a75171a4698e376c78a\" returns successfully" Jul 2 07:54:38.340000 audit[3826]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=3826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:38.340000 audit[3826]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd23a3de20 a2=0 a3=7ffd23a3de0c items=0 ppid=2287 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:38.343000 audit[3826]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:38.343000 audit[3826]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd23a3de20 a2=0 a3=7ffd23a3de0c items=0 ppid=2287 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:38.365000 audit[3829]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=3829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:38.365000 audit[3829]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd66cca810 a2=0 a3=7ffd66cca7fc items=0 ppid=2287 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:38.373000 audit[3829]: NETFILTER_CFG table=nat:108 family=2 entries=56 op=nft_register_chain pid=3829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:54:38.373000 audit[3829]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd66cca810 a2=0 a3=7ffd66cca7fc items=0 ppid=2287 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:38.373000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:54:38.399307 systemd-networkd[1021]: cali4a1daf8782f: Gained IPv6LL Jul 2 07:54:38.783383 systemd-networkd[1021]: cali0af3726daa9: Gained IPv6LL Jul 2 07:54:39.075300 systemd[1]: run-containerd-runc-k8s.io-9792072cde5ed34b43c82539f057d9372f7e1927c8412a75171a4698e376c78a-runc.gcaEiv.mount: Deactivated successfully. Jul 2 07:54:39.296338 systemd-networkd[1021]: calieec6129115c: Gained IPv6LL Jul 2 07:54:40.191789 env[1220]: time="2024-07-02T07:54:40.191732655Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:40.195950 env[1220]: time="2024-07-02T07:54:40.195901660Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:40.199112 env[1220]: time="2024-07-02T07:54:40.199049025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:40.202193 env[1220]: time="2024-07-02T07:54:40.202152494Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:40.202863 env[1220]: time="2024-07-02T07:54:40.202789559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 07:54:40.204884 env[1220]: time="2024-07-02T07:54:40.204852071Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:54:40.242090 env[1220]: time="2024-07-02T07:54:40.240646092Z" level=info msg="CreateContainer within sandbox \"9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 07:54:40.264193 env[1220]: time="2024-07-02T07:54:40.264132470Z" level=info msg="CreateContainer within sandbox \"9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"07f79dd1950a1416b45ea7620d13767b42ed35f535b06cded7d03328a4bc943b\"" Jul 2 07:54:40.265314 env[1220]: time="2024-07-02T07:54:40.265271220Z" level=info msg="StartContainer for \"07f79dd1950a1416b45ea7620d13767b42ed35f535b06cded7d03328a4bc943b\"" Jul 2 07:54:40.322359 systemd[1]: Started cri-containerd-07f79dd1950a1416b45ea7620d13767b42ed35f535b06cded7d03328a4bc943b.scope. Jul 2 07:54:40.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.358000 audit: BPF prog-id=176 op=LOAD Jul 2 07:54:40.358000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.358000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3602 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:40.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663739646431393530613134313662343565613736323064313337 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3602 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:40.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663739646431393530613134313662343565613736323064313337 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit: BPF prog-id=177 op=LOAD Jul 2 07:54:40.359000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000195660 items=0 ppid=3602 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:40.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663739646431393530613134313662343565613736323064313337 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit: BPF prog-id=178 op=LOAD Jul 2 07:54:40.359000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001956a8 items=0 ppid=3602 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:40.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663739646431393530613134313662343565613736323064313337 Jul 2 07:54:40.359000 audit: BPF prog-id=178 op=UNLOAD Jul 2 07:54:40.359000 audit: BPF prog-id=177 op=UNLOAD Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:40.359000 audit: BPF prog-id=179 op=LOAD Jul 2 07:54:40.359000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000195ab8 items=0 ppid=3602 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:40.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663739646431393530613134313662343565613736323064313337 Jul 2 07:54:40.411429 env[1220]: time="2024-07-02T07:54:40.411366691Z" level=info msg="StartContainer for \"07f79dd1950a1416b45ea7620d13767b42ed35f535b06cded7d03328a4bc943b\" returns successfully" Jul 2 07:54:41.255086 kubelet[2103]: I0702 07:54:41.254635 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-68959dfc8c-clwzs" podStartSLOduration=28.327817 podStartE2EDuration="31.25455064s" podCreationTimestamp="2024-07-02 07:54:10 +0000 UTC" firstStartedPulling="2024-07-02 07:54:37.276568447 +0000 UTC m=+49.660263914" lastFinishedPulling="2024-07-02 07:54:40.203302078 +0000 UTC m=+52.586997554" observedRunningTime="2024-07-02 07:54:41.252950116 +0000 UTC m=+53.636645598" watchObservedRunningTime="2024-07-02 07:54:41.25455064 +0000 UTC m=+53.638246123" Jul 2 07:54:41.312793 systemd[1]: run-containerd-runc-k8s.io-07f79dd1950a1416b45ea7620d13767b42ed35f535b06cded7d03328a4bc943b-runc.1uZIwq.mount: Deactivated successfully. Jul 2 07:54:41.591432 env[1220]: time="2024-07-02T07:54:41.591286162Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:41.596009 env[1220]: time="2024-07-02T07:54:41.595957007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:41.598587 env[1220]: time="2024-07-02T07:54:41.598523763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:41.600732 env[1220]: time="2024-07-02T07:54:41.600690810Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:54:41.601717 env[1220]: time="2024-07-02T07:54:41.601666407Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:54:41.605670 env[1220]: time="2024-07-02T07:54:41.605620811Z" level=info msg="CreateContainer within sandbox \"68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:54:41.630215 env[1220]: time="2024-07-02T07:54:41.630141735Z" level=info msg="CreateContainer within sandbox \"68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a814bc28626ff85ebb0a22ab9d782df02b59552e51a02e7b358f5014668d3aa7\"" Jul 2 07:54:41.631346 env[1220]: time="2024-07-02T07:54:41.631304112Z" level=info msg="StartContainer for \"a814bc28626ff85ebb0a22ab9d782df02b59552e51a02e7b358f5014668d3aa7\"" Jul 2 07:54:41.667051 systemd[1]: Started cri-containerd-a814bc28626ff85ebb0a22ab9d782df02b59552e51a02e7b358f5014668d3aa7.scope. Jul 2 07:54:41.730000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.758180 kernel: kauditd_printk_skb: 468 callbacks suppressed Jul 2 07:54:41.758331 kernel: audit: type=1400 audit(1719906881.730:1138): avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.730000 audit[3908]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8cfc37ad58 items=0 ppid=3482 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:41.791299 kernel: audit: type=1300 audit(1719906881.730:1138): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8cfc37ad58 items=0 ppid=3482 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:41.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313462633238363236666638356562623061323261623964373832 Jul 2 07:54:41.822194 kernel: audit: type=1327 audit(1719906881.730:1138): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313462633238363236666638356562623061323261623964373832 Jul 2 07:54:41.822342 kernel: audit: type=1400 audit(1719906881.736:1139): avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.868095 kernel: audit: type=1400 audit(1719906881.736:1139): avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.873058 env[1220]: time="2024-07-02T07:54:41.872999050Z" level=info msg="StartContainer for \"a814bc28626ff85ebb0a22ab9d782df02b59552e51a02e7b358f5014668d3aa7\" returns successfully" Jul 2 07:54:41.890581 kernel: audit: type=1400 audit(1719906881.736:1139): avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.934785 kernel: audit: type=1400 audit(1719906881.736:1139): avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.934954 kernel: audit: type=1400 audit(1719906881.736:1139): avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.977385 kernel: audit: type=1400 audit(1719906881.736:1139): avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.977579 kernel: audit: type=1400 audit(1719906881.736:1139): avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.736000 audit: BPF prog-id=180 op=LOAD Jul 2 07:54:41.736000 audit[3908]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000302528 items=0 ppid=3482 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:41.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313462633238363236666638356562623061323261623964373832 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.790000 audit: BPF prog-id=181 op=LOAD Jul 2 07:54:41.790000 audit[3908]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000302578 items=0 ppid=3482 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:41.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313462633238363236666638356562623061323261623964373832 Jul 2 07:54:41.819000 audit: BPF prog-id=181 op=UNLOAD Jul 2 07:54:41.819000 audit: BPF prog-id=180 op=UNLOAD Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:54:41.819000 audit: BPF prog-id=182 op=LOAD Jul 2 07:54:41.819000 audit[3908]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000302608 items=0 ppid=3482 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:41.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313462633238363236666638356562623061323261623964373832 Jul 2 07:54:42.018540 kubelet[2103]: I0702 07:54:42.018503 2103 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:54:42.018540 kubelet[2103]: I0702 07:54:42.018553 2103 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:54:42.258786 kubelet[2103]: I0702 07:54:42.258650 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-kmmzc" podStartSLOduration=28.582492554 podStartE2EDuration="33.258592851s" podCreationTimestamp="2024-07-02 07:54:09 +0000 UTC" firstStartedPulling="2024-07-02 07:54:36.927101795 +0000 UTC m=+49.310797268" lastFinishedPulling="2024-07-02 07:54:41.603202098 +0000 UTC m=+53.986897565" observedRunningTime="2024-07-02 07:54:42.257321549 +0000 UTC m=+54.641017030" watchObservedRunningTime="2024-07-02 07:54:42.258592851 +0000 UTC m=+54.642288334" Jul 2 07:54:43.022000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:43.022000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001257ce0 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:54:43.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:43.023000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:43.023000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002291d40 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:54:43.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:54:43.869691 systemd[1]: Started sshd@7-10.128.0.53:22-147.75.109.163:40618.service. Jul 2 07:54:43.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.53:22-147.75.109.163:40618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:44.159000 audit[3943]: USER_ACCT pid=3943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:44.162381 sshd[3943]: Accepted publickey for core from 147.75.109.163 port 40618 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:54:44.161000 audit[3943]: CRED_ACQ pid=3943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:44.161000 audit[3943]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a3c0bc0 a2=3 a3=0 items=0 ppid=1 pid=3943 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:44.161000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:44.163461 sshd[3943]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:44.170164 systemd-logind[1228]: New session 8 of user core. Jul 2 07:54:44.170710 systemd[1]: Started session-8.scope. Jul 2 07:54:44.178000 audit[3943]: USER_START pid=3943 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:44.181000 audit[3945]: CRED_ACQ pid=3945 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:44.186000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8246 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.186000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007c878c0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:54:44.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:54:44.211000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.211000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.211000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c010215de0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:54:44.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:54:44.211000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006311500 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:54:44.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:54:44.217000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.217000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007c87950 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:54:44.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:54:44.353000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.353000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006a484e0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:54:44.353000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:54:44.354000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:54:44.354000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006bb4bc0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:54:44.354000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:54:44.511325 sshd[3943]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:44.513000 audit[3943]: USER_END pid=3943 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:44.513000 audit[3943]: CRED_DISP pid=3943 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:44.516979 systemd[1]: sshd@7-10.128.0.53:22-147.75.109.163:40618.service: Deactivated successfully. Jul 2 07:54:44.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.53:22-147.75.109.163:40618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:44.518254 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:54:44.519137 systemd-logind[1228]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:54:44.520420 systemd-logind[1228]: Removed session 8. Jul 2 07:54:47.835603 env[1220]: time="2024-07-02T07:54:47.835555264Z" level=info msg="StopPodSandbox for \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\"" Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.880 [WARNING][3969] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5ebd62fe-ac31-46ea-b90a-1d75ce024bd1", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4", Pod:"coredns-76f75df574-2f6gv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4a1daf8782f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.881 [INFO][3969] k8s.go 608: Cleaning up netns ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.881 [INFO][3969] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" iface="eth0" netns="" Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.881 [INFO][3969] k8s.go 615: Releasing IP address(es) ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.881 [INFO][3969] utils.go 188: Calico CNI releasing IP address ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.913 [INFO][3975] ipam_plugin.go 411: Releasing address using handleID ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.913 [INFO][3975] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.913 [INFO][3975] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.920 [WARNING][3975] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.920 [INFO][3975] ipam_plugin.go 439: Releasing address using workloadID ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.922 [INFO][3975] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:47.925148 env[1220]: 2024-07-02 07:54:47.923 [INFO][3969] k8s.go 621: Teardown processing complete. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:47.925954 env[1220]: time="2024-07-02T07:54:47.925195241Z" level=info msg="TearDown network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\" successfully" Jul 2 07:54:47.925954 env[1220]: time="2024-07-02T07:54:47.925236217Z" level=info msg="StopPodSandbox for \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\" returns successfully" Jul 2 07:54:47.926149 env[1220]: time="2024-07-02T07:54:47.926108969Z" level=info msg="RemovePodSandbox for \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\"" Jul 2 07:54:47.926246 env[1220]: time="2024-07-02T07:54:47.926158583Z" level=info msg="Forcibly stopping sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\"" Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:47.979 [WARNING][3995] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5ebd62fe-ac31-46ea-b90a-1d75ce024bd1", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"d36241b8c5b4eb1c9033fd27e7ccee73ffd86bffe11a275d58a4ad0a5b73cce4", Pod:"coredns-76f75df574-2f6gv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4a1daf8782f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:47.979 [INFO][3995] k8s.go 608: Cleaning up netns ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:47.979 [INFO][3995] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" iface="eth0" netns="" Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:47.979 [INFO][3995] k8s.go 615: Releasing IP address(es) ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:47.979 [INFO][3995] utils.go 188: Calico CNI releasing IP address ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:48.014 [INFO][4004] ipam_plugin.go 411: Releasing address using handleID ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:48.015 [INFO][4004] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:48.015 [INFO][4004] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:48.022 [WARNING][4004] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:48.023 [INFO][4004] ipam_plugin.go 439: Releasing address using workloadID ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" HandleID="k8s-pod-network.4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--2f6gv-eth0" Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:48.025 [INFO][4004] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:48.027640 env[1220]: 2024-07-02 07:54:48.026 [INFO][3995] k8s.go 621: Teardown processing complete. ContainerID="4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0" Jul 2 07:54:48.028553 env[1220]: time="2024-07-02T07:54:48.027685365Z" level=info msg="TearDown network for sandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\" successfully" Jul 2 07:54:48.033121 env[1220]: time="2024-07-02T07:54:48.033036444Z" level=info msg="RemovePodSandbox \"4206eb2a67e8277c6fc08f03eaad6684ca4e0d6ea3b7aa27a2b95758c823d5c0\" returns successfully" Jul 2 07:54:48.034061 env[1220]: time="2024-07-02T07:54:48.034015296Z" level=info msg="StopPodSandbox for \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\"" Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.077 [WARNING][4023] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8c996f67-c276-45e6-864e-55e4231c520c", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f", Pod:"coredns-76f75df574-9skwb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieec6129115c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.077 [INFO][4023] k8s.go 608: Cleaning up netns ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.078 [INFO][4023] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" iface="eth0" netns="" Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.078 [INFO][4023] k8s.go 615: Releasing IP address(es) ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.078 [INFO][4023] utils.go 188: Calico CNI releasing IP address ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.105 [INFO][4029] ipam_plugin.go 411: Releasing address using handleID ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.105 [INFO][4029] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.106 [INFO][4029] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.113 [WARNING][4029] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.113 [INFO][4029] ipam_plugin.go 439: Releasing address using workloadID ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.115 [INFO][4029] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:48.119000 env[1220]: 2024-07-02 07:54:48.117 [INFO][4023] k8s.go 621: Teardown processing complete. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:48.120178 env[1220]: time="2024-07-02T07:54:48.119079139Z" level=info msg="TearDown network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\" successfully" Jul 2 07:54:48.120178 env[1220]: time="2024-07-02T07:54:48.119122947Z" level=info msg="StopPodSandbox for \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\" returns successfully" Jul 2 07:54:48.120562 env[1220]: time="2024-07-02T07:54:48.120523395Z" level=info msg="RemovePodSandbox for \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\"" Jul 2 07:54:48.120860 env[1220]: time="2024-07-02T07:54:48.120793718Z" level=info msg="Forcibly stopping sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\"" Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.164 [WARNING][4047] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8c996f67-c276-45e6-864e-55e4231c520c", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"1f811c10bba5db63bf728f31f6583c6c72eba6f6b41fb6a9a9a5d3b78d3de19f", Pod:"coredns-76f75df574-9skwb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieec6129115c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.165 [INFO][4047] k8s.go 608: Cleaning up netns ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.165 [INFO][4047] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" iface="eth0" netns="" Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.165 [INFO][4047] k8s.go 615: Releasing IP address(es) ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.165 [INFO][4047] utils.go 188: Calico CNI releasing IP address ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.229 [INFO][4054] ipam_plugin.go 411: Releasing address using handleID ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.229 [INFO][4054] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.229 [INFO][4054] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.248 [WARNING][4054] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.248 [INFO][4054] ipam_plugin.go 439: Releasing address using workloadID ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" HandleID="k8s-pod-network.5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-coredns--76f75df574--9skwb-eth0" Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.250 [INFO][4054] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:48.253831 env[1220]: 2024-07-02 07:54:48.251 [INFO][4047] k8s.go 621: Teardown processing complete. ContainerID="5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6" Jul 2 07:54:48.254808 env[1220]: time="2024-07-02T07:54:48.253900651Z" level=info msg="TearDown network for sandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\" successfully" Jul 2 07:54:48.261343 env[1220]: time="2024-07-02T07:54:48.261297015Z" level=info msg="RemovePodSandbox \"5e106efaaae2663923ca7c78be565db86fe097d6bc270b7f3a6995006f0bd0a6\" returns successfully" Jul 2 07:54:48.264437 env[1220]: time="2024-07-02T07:54:48.264394853Z" level=info msg="StopPodSandbox for \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\"" Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.316 [WARNING][4075] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0", GenerateName:"calico-kube-controllers-68959dfc8c-", Namespace:"calico-system", SelfLink:"", UID:"bddebf50-2327-45c6-95ff-420ceba20596", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68959dfc8c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10", Pod:"calico-kube-controllers-68959dfc8c-clwzs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.98.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0af3726daa9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.316 [INFO][4075] k8s.go 608: Cleaning up netns ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.316 [INFO][4075] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" iface="eth0" netns="" Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.317 [INFO][4075] k8s.go 615: Releasing IP address(es) ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.317 [INFO][4075] utils.go 188: Calico CNI releasing IP address ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.342 [INFO][4081] ipam_plugin.go 411: Releasing address using handleID ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.343 [INFO][4081] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.343 [INFO][4081] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.350 [WARNING][4081] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.350 [INFO][4081] ipam_plugin.go 439: Releasing address using workloadID ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.352 [INFO][4081] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:48.355569 env[1220]: 2024-07-02 07:54:48.353 [INFO][4075] k8s.go 621: Teardown processing complete. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:48.356387 env[1220]: time="2024-07-02T07:54:48.356151127Z" level=info msg="TearDown network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\" successfully" Jul 2 07:54:48.356387 env[1220]: time="2024-07-02T07:54:48.356200891Z" level=info msg="StopPodSandbox for \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\" returns successfully" Jul 2 07:54:48.357018 env[1220]: time="2024-07-02T07:54:48.356979107Z" level=info msg="RemovePodSandbox for \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\"" Jul 2 07:54:48.357377 env[1220]: time="2024-07-02T07:54:48.357320400Z" level=info msg="Forcibly stopping sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\"" Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.403 [WARNING][4099] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0", GenerateName:"calico-kube-controllers-68959dfc8c-", Namespace:"calico-system", SelfLink:"", UID:"bddebf50-2327-45c6-95ff-420ceba20596", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68959dfc8c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"9bd77b060a3c894058e21ceeefdac3e3d8cb291f811d81eed319f03b9d370a10", Pod:"calico-kube-controllers-68959dfc8c-clwzs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.98.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0af3726daa9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.403 [INFO][4099] k8s.go 608: Cleaning up netns ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.403 [INFO][4099] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" iface="eth0" netns="" Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.403 [INFO][4099] k8s.go 615: Releasing IP address(es) ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.403 [INFO][4099] utils.go 188: Calico CNI releasing IP address ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.430 [INFO][4105] ipam_plugin.go 411: Releasing address using handleID ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.430 [INFO][4105] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.430 [INFO][4105] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.438 [WARNING][4105] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.438 [INFO][4105] ipam_plugin.go 439: Releasing address using workloadID ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" HandleID="k8s-pod-network.1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--kube--controllers--68959dfc8c--clwzs-eth0" Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.440 [INFO][4105] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:48.445605 env[1220]: 2024-07-02 07:54:48.441 [INFO][4099] k8s.go 621: Teardown processing complete. ContainerID="1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29" Jul 2 07:54:48.445605 env[1220]: time="2024-07-02T07:54:48.443030200Z" level=info msg="TearDown network for sandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\" successfully" Jul 2 07:54:48.448234 env[1220]: time="2024-07-02T07:54:48.448180679Z" level=info msg="RemovePodSandbox \"1eaef071821b2a6eb983bcdcc0f36df0ef894af57535d6d93fb49512ecb33e29\" returns successfully" Jul 2 07:54:48.448911 env[1220]: time="2024-07-02T07:54:48.448852716Z" level=info msg="StopPodSandbox for \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\"" Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.493 [WARNING][4124] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6c454dcc-a1d2-4ff3-8312-8135e3289602", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad", Pod:"csi-node-driver-kmmzc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8ff5c7730bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.494 [INFO][4124] k8s.go 608: Cleaning up netns ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.494 [INFO][4124] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" iface="eth0" netns="" Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.494 [INFO][4124] k8s.go 615: Releasing IP address(es) ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.494 [INFO][4124] utils.go 188: Calico CNI releasing IP address ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.520 [INFO][4130] ipam_plugin.go 411: Releasing address using handleID ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.522 [INFO][4130] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.522 [INFO][4130] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.530 [WARNING][4130] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.530 [INFO][4130] ipam_plugin.go 439: Releasing address using workloadID ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.532 [INFO][4130] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:48.534483 env[1220]: 2024-07-02 07:54:48.533 [INFO][4124] k8s.go 621: Teardown processing complete. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:48.535305 env[1220]: time="2024-07-02T07:54:48.534541793Z" level=info msg="TearDown network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\" successfully" Jul 2 07:54:48.535305 env[1220]: time="2024-07-02T07:54:48.534587262Z" level=info msg="StopPodSandbox for \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\" returns successfully" Jul 2 07:54:48.535670 env[1220]: time="2024-07-02T07:54:48.535623393Z" level=info msg="RemovePodSandbox for \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\"" Jul 2 07:54:48.535801 env[1220]: time="2024-07-02T07:54:48.535674387Z" level=info msg="Forcibly stopping sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\"" Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.578 [WARNING][4149] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6c454dcc-a1d2-4ff3-8312-8135e3289602", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 54, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"68281b8d506df547b53968a66f8f423e0e232e20943f0f35a71b5023d4f6bcad", Pod:"csi-node-driver-kmmzc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8ff5c7730bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.578 [INFO][4149] k8s.go 608: Cleaning up netns ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.578 [INFO][4149] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" iface="eth0" netns="" Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.578 [INFO][4149] k8s.go 615: Releasing IP address(es) ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.579 [INFO][4149] utils.go 188: Calico CNI releasing IP address ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.606 [INFO][4155] ipam_plugin.go 411: Releasing address using handleID ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.606 [INFO][4155] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.606 [INFO][4155] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.614 [WARNING][4155] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.615 [INFO][4155] ipam_plugin.go 439: Releasing address using workloadID ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" HandleID="k8s-pod-network.24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-csi--node--driver--kmmzc-eth0" Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.620 [INFO][4155] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:54:48.624441 env[1220]: 2024-07-02 07:54:48.623 [INFO][4149] k8s.go 621: Teardown processing complete. ContainerID="24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9" Jul 2 07:54:48.625301 env[1220]: time="2024-07-02T07:54:48.624519397Z" level=info msg="TearDown network for sandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\" successfully" Jul 2 07:54:48.629519 env[1220]: time="2024-07-02T07:54:48.629467968Z" level=info msg="RemovePodSandbox \"24d6297f79fb547402e64c26cccbe02425925932569240cf606ddff03e06a9d9\" returns successfully" Jul 2 07:54:49.561624 systemd[1]: Started sshd@8-10.128.0.53:22-147.75.109.163:40632.service. Jul 2 07:54:49.592867 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 2 07:54:49.592985 kernel: audit: type=1130 audit(1719906889.561:1161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.53:22-147.75.109.163:40632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:49.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.53:22-147.75.109.163:40632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:49.858000 audit[4163]: USER_ACCT pid=4163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:49.889441 sshd[4163]: Accepted publickey for core from 147.75.109.163 port 40632 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:54:49.890140 kernel: audit: type=1101 audit(1719906889.858:1162): pid=4163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:49.888000 audit[4163]: CRED_ACQ pid=4163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:49.893022 sshd[4163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:49.903982 systemd[1]: Started session-9.scope. Jul 2 07:54:49.905125 systemd-logind[1228]: New session 9 of user core. Jul 2 07:54:49.916524 kernel: audit: type=1103 audit(1719906889.888:1163): pid=4163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:49.916756 kernel: audit: type=1006 audit(1719906889.891:1164): pid=4163 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Jul 2 07:54:49.891000 audit[4163]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf9f5f140 a2=3 a3=0 items=0 ppid=1 pid=4163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:49.933102 kernel: audit: type=1300 audit(1719906889.891:1164): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf9f5f140 a2=3 a3=0 items=0 ppid=1 pid=4163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:49.891000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:49.961168 kernel: audit: type=1327 audit(1719906889.891:1164): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:49.914000 audit[4163]: USER_START pid=4163 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.002812 kernel: audit: type=1105 audit(1719906889.914:1165): pid=4163 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:49.918000 audit[4165]: CRED_ACQ pid=4165 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.027364 kernel: audit: type=1103 audit(1719906889.918:1166): pid=4165 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.169293 sshd[4163]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:50.170000 audit[4163]: USER_END pid=4163 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.205104 kernel: audit: type=1106 audit(1719906890.170:1167): pid=4163 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.170000 audit[4163]: CRED_DISP pid=4163 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.206355 systemd[1]: sshd@8-10.128.0.53:22-147.75.109.163:40632.service: Deactivated successfully. Jul 2 07:54:50.207462 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:54:50.209572 systemd-logind[1228]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:54:50.211156 systemd-logind[1228]: Removed session 9. Jul 2 07:54:50.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.53:22-147.75.109.163:40632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:50.230111 kernel: audit: type=1104 audit(1719906890.170:1168): pid=4163 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:50.906854 systemd[1]: run-containerd-runc-k8s.io-07f79dd1950a1416b45ea7620d13767b42ed35f535b06cded7d03328a4bc943b-runc.mP5wqg.mount: Deactivated successfully. Jul 2 07:54:55.216738 systemd[1]: Started sshd@9-10.128.0.53:22-147.75.109.163:39282.service. Jul 2 07:54:55.247820 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:54:55.247941 kernel: audit: type=1130 audit(1719906895.216:1170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.53:22-147.75.109.163:39282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:55.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.53:22-147.75.109.163:39282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:55.508000 audit[4206]: USER_ACCT pid=4206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.539223 kernel: audit: type=1101 audit(1719906895.508:1171): pid=4206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.539433 sshd[4206]: Accepted publickey for core from 147.75.109.163 port 39282 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:54:55.539000 audit[4206]: CRED_ACQ pid=4206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.541563 sshd[4206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:55.549860 systemd[1]: Started session-10.scope. Jul 2 07:54:55.551870 systemd-logind[1228]: New session 10 of user core. Jul 2 07:54:55.568116 kernel: audit: type=1103 audit(1719906895.539:1172): pid=4206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.568221 kernel: audit: type=1006 audit(1719906895.539:1173): pid=4206 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 07:54:55.583089 kernel: audit: type=1300 audit(1719906895.539:1173): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3e6716e0 a2=3 a3=0 items=0 ppid=1 pid=4206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:55.539000 audit[4206]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3e6716e0 a2=3 a3=0 items=0 ppid=1 pid=4206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:55.539000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:55.620897 kernel: audit: type=1327 audit(1719906895.539:1173): proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:55.621083 kernel: audit: type=1105 audit(1719906895.560:1174): pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.560000 audit[4206]: USER_START pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.560000 audit[4208]: CRED_ACQ pid=4208 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.677606 kernel: audit: type=1103 audit(1719906895.560:1175): pid=4208 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.823126 sshd[4206]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:55.824000 audit[4206]: USER_END pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.829039 systemd[1]: sshd@9-10.128.0.53:22-147.75.109.163:39282.service: Deactivated successfully. Jul 2 07:54:55.830197 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:54:55.831931 systemd-logind[1228]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:54:55.833476 systemd-logind[1228]: Removed session 10. Jul 2 07:54:55.824000 audit[4206]: CRED_DISP pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.882920 kernel: audit: type=1106 audit(1719906895.824:1176): pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.883261 kernel: audit: type=1104 audit(1719906895.824:1177): pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:55.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.53:22-147.75.109.163:39282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:55.889969 systemd[1]: Started sshd@10-10.128.0.53:22-147.75.109.163:39288.service. Jul 2 07:54:55.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.53:22-147.75.109.163:39288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:56.183000 audit[4219]: USER_ACCT pid=4219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.184765 sshd[4219]: Accepted publickey for core from 147.75.109.163 port 39288 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:54:56.185000 audit[4219]: CRED_ACQ pid=4219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.185000 audit[4219]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff168b5f70 a2=3 a3=0 items=0 ppid=1 pid=4219 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:56.185000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:56.187006 sshd[4219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:56.194176 systemd[1]: Started session-11.scope. Jul 2 07:54:56.194183 systemd-logind[1228]: New session 11 of user core. Jul 2 07:54:56.201000 audit[4219]: USER_START pid=4219 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.204000 audit[4221]: CRED_ACQ pid=4221 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.531169 sshd[4219]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:56.532000 audit[4219]: USER_END pid=4219 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.533000 audit[4219]: CRED_DISP pid=4219 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.536286 systemd[1]: sshd@10-10.128.0.53:22-147.75.109.163:39288.service: Deactivated successfully. Jul 2 07:54:56.537502 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:54:56.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.53:22-147.75.109.163:39288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:56.538589 systemd-logind[1228]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:54:56.539777 systemd-logind[1228]: Removed session 11. Jul 2 07:54:56.579454 systemd[1]: Started sshd@11-10.128.0.53:22-147.75.109.163:39302.service. Jul 2 07:54:56.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.53:22-147.75.109.163:39302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:56.867000 audit[4228]: USER_ACCT pid=4228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.867810 sshd[4228]: Accepted publickey for core from 147.75.109.163 port 39302 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:54:56.869000 audit[4228]: CRED_ACQ pid=4228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.869000 audit[4228]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc789fe3d0 a2=3 a3=0 items=0 ppid=1 pid=4228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:54:56.869000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:54:56.870249 sshd[4228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:54:56.877493 systemd[1]: Started session-12.scope. Jul 2 07:54:56.878302 systemd-logind[1228]: New session 12 of user core. Jul 2 07:54:56.887000 audit[4228]: USER_START pid=4228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:56.890000 audit[4230]: CRED_ACQ pid=4230 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:57.173531 sshd[4228]: pam_unix(sshd:session): session closed for user core Jul 2 07:54:57.178000 audit[4228]: USER_END pid=4228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:57.179000 audit[4228]: CRED_DISP pid=4228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:54:57.182954 systemd-logind[1228]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:54:57.183560 systemd[1]: sshd@11-10.128.0.53:22-147.75.109.163:39302.service: Deactivated successfully. Jul 2 07:54:57.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.53:22-147.75.109.163:39302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:54:57.184770 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:54:57.187382 systemd-logind[1228]: Removed session 12. Jul 2 07:54:58.941843 systemd[1]: run-containerd-runc-k8s.io-3defe04cf3a6fc22d741474653b7f2de41072d3efbd9d2525125fc1f725d920b-runc.q6gmAZ.mount: Deactivated successfully. Jul 2 07:55:01.414000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:01.421087 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:55:01.421223 kernel: audit: type=1400 audit(1719906901.414:1197): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:01.414000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfc6a0 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:01.447103 kernel: audit: type=1300 audit(1719906901.414:1197): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfc6a0 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:01.414000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:01.419000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:01.536011 kernel: audit: type=1327 audit(1719906901.414:1197): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:01.536164 kernel: audit: type=1400 audit(1719906901.419:1198): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:01.419000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c00640 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:01.419000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:01.571107 kernel: audit: type=1300 audit(1719906901.419:1198): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c00640 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:01.571170 kernel: audit: type=1327 audit(1719906901.419:1198): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:01.420000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:01.600104 kernel: audit: type=1400 audit(1719906901.420:1199): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:01.420000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c00660 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:01.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:01.688770 kernel: audit: type=1300 audit(1719906901.420:1199): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c00660 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:01.688939 kernel: audit: type=1327 audit(1719906901.420:1199): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:01.688978 kernel: audit: type=1400 audit(1719906901.420:1200): avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:01.420000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:01.420000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c00840 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:01.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:02.222332 systemd[1]: Started sshd@12-10.128.0.53:22-147.75.109.163:39306.service. Jul 2 07:55:02.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.53:22-147.75.109.163:39306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:02.514000 audit[4268]: USER_ACCT pid=4268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:02.517181 sshd[4268]: Accepted publickey for core from 147.75.109.163 port 39306 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:02.516000 audit[4268]: CRED_ACQ pid=4268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:02.516000 audit[4268]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc32e5ede0 a2=3 a3=0 items=0 ppid=1 pid=4268 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:02.516000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:02.518286 sshd[4268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:02.524148 systemd-logind[1228]: New session 13 of user core. Jul 2 07:55:02.525704 systemd[1]: Started session-13.scope. Jul 2 07:55:02.534000 audit[4268]: USER_START pid=4268 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:02.537000 audit[4270]: CRED_ACQ pid=4270 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:02.814149 sshd[4268]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:02.815000 audit[4268]: USER_END pid=4268 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:02.815000 audit[4268]: CRED_DISP pid=4268 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:02.820224 systemd-logind[1228]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:55:02.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.53:22-147.75.109.163:39306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:02.821105 systemd[1]: sshd@12-10.128.0.53:22-147.75.109.163:39306.service: Deactivated successfully. Jul 2 07:55:02.822348 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:55:02.825212 systemd-logind[1228]: Removed session 13. Jul 2 07:55:07.861601 systemd[1]: Started sshd@13-10.128.0.53:22-147.75.109.163:54350.service. Jul 2 07:55:07.892983 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:55:07.893158 kernel: audit: type=1130 audit(1719906907.861:1210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.53:22-147.75.109.163:54350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:07.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.53:22-147.75.109.163:54350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:08.152000 audit[4286]: USER_ACCT pid=4286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.155278 sshd[4286]: Accepted publickey for core from 147.75.109.163 port 54350 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:08.184200 kernel: audit: type=1101 audit(1719906908.152:1211): pid=4286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.182000 audit[4286]: CRED_ACQ pid=4286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.185477 sshd[4286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:08.194697 systemd-logind[1228]: New session 14 of user core. Jul 2 07:55:08.195644 systemd[1]: Started session-14.scope. Jul 2 07:55:08.226946 kernel: audit: type=1103 audit(1719906908.182:1212): pid=4286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.227130 kernel: audit: type=1006 audit(1719906908.183:1213): pid=4286 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 2 07:55:08.227177 kernel: audit: type=1300 audit(1719906908.183:1213): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff20c364f0 a2=3 a3=0 items=0 ppid=1 pid=4286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.183000 audit[4286]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff20c364f0 a2=3 a3=0 items=0 ppid=1 pid=4286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:08.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:08.256188 kernel: audit: type=1327 audit(1719906908.183:1213): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:08.203000 audit[4286]: USER_START pid=4286 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.297103 kernel: audit: type=1105 audit(1719906908.203:1214): pid=4286 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.206000 audit[4288]: CRED_ACQ pid=4288 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.321914 kernel: audit: type=1103 audit(1719906908.206:1215): pid=4288 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.469291 sshd[4286]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:08.471000 audit[4286]: USER_END pid=4286 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.505102 kernel: audit: type=1106 audit(1719906908.471:1216): pid=4286 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.471000 audit[4286]: CRED_DISP pid=4286 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:08.507510 systemd[1]: sshd@13-10.128.0.53:22-147.75.109.163:54350.service: Deactivated successfully. Jul 2 07:55:08.508627 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:55:08.510702 systemd-logind[1228]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:55:08.512546 systemd-logind[1228]: Removed session 14. Jul 2 07:55:08.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.53:22-147.75.109.163:54350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:08.530119 kernel: audit: type=1104 audit(1719906908.471:1217): pid=4286 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:13.518457 systemd[1]: Started sshd@14-10.128.0.53:22-147.75.109.163:57912.service. Jul 2 07:55:13.549934 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:55:13.550104 kernel: audit: type=1130 audit(1719906913.518:1219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.53:22-147.75.109.163:57912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:13.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.53:22-147.75.109.163:57912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:13.822000 audit[4309]: USER_ACCT pid=4309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:13.853624 sshd[4309]: Accepted publickey for core from 147.75.109.163 port 57912 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:13.854119 kernel: audit: type=1101 audit(1719906913.822:1220): pid=4309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:13.852000 audit[4309]: CRED_ACQ pid=4309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:13.855502 sshd[4309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:13.865511 systemd[1]: Started session-15.scope. Jul 2 07:55:13.867129 systemd-logind[1228]: New session 15 of user core. Jul 2 07:55:13.881183 kernel: audit: type=1103 audit(1719906913.852:1221): pid=4309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:13.898112 kernel: audit: type=1006 audit(1719906913.852:1222): pid=4309 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 2 07:55:13.898261 kernel: audit: type=1300 audit(1719906913.852:1222): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5b2cc0d0 a2=3 a3=0 items=0 ppid=1 pid=4309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:13.852000 audit[4309]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5b2cc0d0 a2=3 a3=0 items=0 ppid=1 pid=4309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:13.852000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:13.936056 kernel: audit: type=1327 audit(1719906913.852:1222): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:13.936227 kernel: audit: type=1105 audit(1719906913.874:1223): pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:13.874000 audit[4309]: USER_START pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:13.878000 audit[4311]: CRED_ACQ pid=4311 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:13.969107 kernel: audit: type=1103 audit(1719906913.878:1224): pid=4311 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:14.189748 sshd[4309]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:14.190000 audit[4309]: USER_END pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:14.200993 systemd-logind[1228]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:55:14.202566 systemd[1]: sshd@14-10.128.0.53:22-147.75.109.163:57912.service: Deactivated successfully. Jul 2 07:55:14.203681 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:55:14.205748 systemd-logind[1228]: Removed session 15. Jul 2 07:55:14.191000 audit[4309]: CRED_DISP pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:14.248925 kernel: audit: type=1106 audit(1719906914.190:1225): pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:14.249128 kernel: audit: type=1104 audit(1719906914.191:1226): pid=4309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:14.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.53:22-147.75.109.163:57912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:19.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.53:22-147.75.109.163:57924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:19.237203 systemd[1]: Started sshd@15-10.128.0.53:22-147.75.109.163:57924.service. Jul 2 07:55:19.243120 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:55:19.243300 kernel: audit: type=1130 audit(1719906919.236:1228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.53:22-147.75.109.163:57924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:19.538000 audit[4323]: USER_ACCT pid=4323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.539618 sshd[4323]: Accepted publickey for core from 147.75.109.163 port 57924 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:19.569104 kernel: audit: type=1101 audit(1719906919.538:1229): pid=4323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.570597 sshd[4323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:19.568000 audit[4323]: CRED_ACQ pid=4323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.580936 systemd[1]: Started session-16.scope. Jul 2 07:55:19.582889 systemd-logind[1228]: New session 16 of user core. Jul 2 07:55:19.600936 kernel: audit: type=1103 audit(1719906919.568:1230): pid=4323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.601104 kernel: audit: type=1006 audit(1719906919.568:1231): pid=4323 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 07:55:19.568000 audit[4323]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc40eaf7a0 a2=3 a3=0 items=0 ppid=1 pid=4323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:19.647823 kernel: audit: type=1300 audit(1719906919.568:1231): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc40eaf7a0 a2=3 a3=0 items=0 ppid=1 pid=4323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:19.648054 kernel: audit: type=1327 audit(1719906919.568:1231): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:19.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:19.591000 audit[4323]: USER_START pid=4323 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.687116 kernel: audit: type=1105 audit(1719906919.591:1232): pid=4323 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.594000 audit[4325]: CRED_ACQ pid=4325 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.711793 kernel: audit: type=1103 audit(1719906919.594:1233): pid=4325 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.847394 sshd[4323]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:19.848000 audit[4323]: USER_END pid=4323 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.848000 audit[4323]: CRED_DISP pid=4323 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.887700 systemd[1]: sshd@15-10.128.0.53:22-147.75.109.163:57924.service: Deactivated successfully. Jul 2 07:55:19.888839 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 07:55:19.893221 systemd-logind[1228]: Session 16 logged out. Waiting for processes to exit. Jul 2 07:55:19.895410 systemd-logind[1228]: Removed session 16. Jul 2 07:55:19.906370 kernel: audit: type=1106 audit(1719906919.848:1234): pid=4323 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.906545 kernel: audit: type=1104 audit(1719906919.848:1235): pid=4323 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:19.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.53:22-147.75.109.163:57924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:19.913920 systemd[1]: Started sshd@16-10.128.0.53:22-147.75.109.163:57926.service. Jul 2 07:55:19.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.53:22-147.75.109.163:57926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:20.205000 audit[4336]: USER_ACCT pid=4336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.206448 sshd[4336]: Accepted publickey for core from 147.75.109.163 port 57926 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:20.207000 audit[4336]: CRED_ACQ pid=4336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.207000 audit[4336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5a7fbfc0 a2=3 a3=0 items=0 ppid=1 pid=4336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:20.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:20.209315 sshd[4336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:20.216372 systemd[1]: Started session-17.scope. Jul 2 07:55:20.217235 systemd-logind[1228]: New session 17 of user core. Jul 2 07:55:20.224000 audit[4336]: USER_START pid=4336 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.227000 audit[4338]: CRED_ACQ pid=4338 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.605330 sshd[4336]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:20.606000 audit[4336]: USER_END pid=4336 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.606000 audit[4336]: CRED_DISP pid=4336 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.610133 systemd[1]: sshd@16-10.128.0.53:22-147.75.109.163:57926.service: Deactivated successfully. Jul 2 07:55:20.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.53:22-147.75.109.163:57926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:20.611395 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 07:55:20.612521 systemd-logind[1228]: Session 17 logged out. Waiting for processes to exit. Jul 2 07:55:20.615037 systemd-logind[1228]: Removed session 17. Jul 2 07:55:20.652018 systemd[1]: Started sshd@17-10.128.0.53:22-147.75.109.163:57930.service. Jul 2 07:55:20.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.53:22-147.75.109.163:57930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:20.908932 systemd[1]: run-containerd-runc-k8s.io-07f79dd1950a1416b45ea7620d13767b42ed35f535b06cded7d03328a4bc943b-runc.5C0TTr.mount: Deactivated successfully. Jul 2 07:55:20.958000 audit[4345]: USER_ACCT pid=4345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.959658 sshd[4345]: Accepted publickey for core from 147.75.109.163 port 57930 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:20.960000 audit[4345]: CRED_ACQ pid=4345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.960000 audit[4345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8a95bc80 a2=3 a3=0 items=0 ppid=1 pid=4345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:20.960000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:20.962205 sshd[4345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:20.969576 systemd[1]: Started session-18.scope. Jul 2 07:55:20.970488 systemd-logind[1228]: New session 18 of user core. Jul 2 07:55:20.977000 audit[4345]: USER_START pid=4345 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:20.979000 audit[4366]: CRED_ACQ pid=4366 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:22.978000 audit[4376]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=4376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:22.978000 audit[4376]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcf01cd630 a2=0 a3=7ffcf01cd61c items=0 ppid=2287 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:22.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:22.980000 audit[4376]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:22.980000 audit[4376]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcf01cd630 a2=0 a3=0 items=0 ppid=2287 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:22.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:22.997000 audit[4378]: NETFILTER_CFG table=filter:111 family=2 entries=32 op=nft_register_rule pid=4378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:22.997000 audit[4378]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc1578d9e0 a2=0 a3=7ffc1578d9cc items=0 ppid=2287 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:22.997000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:22.999000 audit[4378]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:22.999000 audit[4378]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc1578d9e0 a2=0 a3=0 items=0 ppid=2287 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:22.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:23.019610 sshd[4345]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:23.020000 audit[4345]: USER_END pid=4345 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.020000 audit[4345]: CRED_DISP pid=4345 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.024697 systemd-logind[1228]: Session 18 logged out. Waiting for processes to exit. Jul 2 07:55:23.026865 systemd[1]: sshd@17-10.128.0.53:22-147.75.109.163:57930.service: Deactivated successfully. Jul 2 07:55:23.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.53:22-147.75.109.163:57930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:23.028037 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 07:55:23.030056 systemd-logind[1228]: Removed session 18. Jul 2 07:55:23.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.53:22-147.75.109.163:54990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:23.066237 systemd[1]: Started sshd@18-10.128.0.53:22-147.75.109.163:54990.service. Jul 2 07:55:23.354000 audit[4386]: USER_ACCT pid=4386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.357134 sshd[4386]: Accepted publickey for core from 147.75.109.163 port 54990 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:23.356000 audit[4386]: CRED_ACQ pid=4386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.356000 audit[4386]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8fbf8bc0 a2=3 a3=0 items=0 ppid=1 pid=4386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:23.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:23.358346 sshd[4386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:23.366481 systemd[1]: Started session-19.scope. Jul 2 07:55:23.367221 systemd-logind[1228]: New session 19 of user core. Jul 2 07:55:23.375000 audit[4386]: USER_START pid=4386 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.377000 audit[4388]: CRED_ACQ pid=4388 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.786977 sshd[4386]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:23.789000 audit[4386]: USER_END pid=4386 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.790000 audit[4386]: CRED_DISP pid=4386 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:23.792807 systemd[1]: sshd@18-10.128.0.53:22-147.75.109.163:54990.service: Deactivated successfully. Jul 2 07:55:23.794038 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 07:55:23.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.53:22-147.75.109.163:54990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:23.795080 systemd-logind[1228]: Session 19 logged out. Waiting for processes to exit. Jul 2 07:55:23.796484 systemd-logind[1228]: Removed session 19. Jul 2 07:55:23.836263 systemd[1]: Started sshd@19-10.128.0.53:22-147.75.109.163:55002.service. Jul 2 07:55:23.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.53:22-147.75.109.163:55002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.144000 audit[4395]: USER_ACCT pid=4395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:24.145824 sshd[4395]: Accepted publickey for core from 147.75.109.163 port 55002 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:24.146000 audit[4395]: CRED_ACQ pid=4395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:24.146000 audit[4395]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe63c28890 a2=3 a3=0 items=0 ppid=1 pid=4395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:24.147728 sshd[4395]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:24.156881 systemd-logind[1228]: New session 20 of user core. Jul 2 07:55:24.157817 systemd[1]: Started session-20.scope. Jul 2 07:55:24.169000 audit[4395]: USER_START pid=4395 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:24.172000 audit[4397]: CRED_ACQ pid=4397 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:24.509014 sshd[4395]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:24.541181 kernel: kauditd_printk_skb: 54 callbacks suppressed Jul 2 07:55:24.541381 kernel: audit: type=1106 audit(1719906924.510:1274): pid=4395 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:24.510000 audit[4395]: USER_END pid=4395 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:24.552272 systemd[1]: sshd@19-10.128.0.53:22-147.75.109.163:55002.service: Deactivated successfully. Jul 2 07:55:24.553476 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 07:55:24.510000 audit[4395]: CRED_DISP pid=4395 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:24.555040 systemd-logind[1228]: Session 20 logged out. Waiting for processes to exit. Jul 2 07:55:24.560843 systemd-logind[1228]: Removed session 20. Jul 2 07:55:24.580103 kernel: audit: type=1104 audit(1719906924.510:1275): pid=4395 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:24.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.53:22-147.75.109.163:55002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.606106 kernel: audit: type=1131 audit(1719906924.551:1276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.53:22-147.75.109.163:55002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:24.824649 kubelet[2103]: I0702 07:55:24.824517 2103 topology_manager.go:215] "Topology Admit Handler" podUID="ca67f849-3618-4b94-a40b-16b786f73d04" podNamespace="calico-apiserver" podName="calico-apiserver-78f595bc45-8g9nk" Jul 2 07:55:24.834704 systemd[1]: Created slice kubepods-besteffort-podca67f849_3618_4b94_a40b_16b786f73d04.slice. Jul 2 07:55:24.882777 kubelet[2103]: I0702 07:55:24.882726 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rxx4x\" (UniqueName: \"kubernetes.io/projected/ca67f849-3618-4b94-a40b-16b786f73d04-kube-api-access-rxx4x\") pod \"calico-apiserver-78f595bc45-8g9nk\" (UID: \"ca67f849-3618-4b94-a40b-16b786f73d04\") " pod="calico-apiserver/calico-apiserver-78f595bc45-8g9nk" Jul 2 07:55:24.882983 kubelet[2103]: I0702 07:55:24.882813 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ca67f849-3618-4b94-a40b-16b786f73d04-calico-apiserver-certs\") pod \"calico-apiserver-78f595bc45-8g9nk\" (UID: \"ca67f849-3618-4b94-a40b-16b786f73d04\") " pod="calico-apiserver/calico-apiserver-78f595bc45-8g9nk" Jul 2 07:55:24.897000 audit[4407]: NETFILTER_CFG table=filter:113 family=2 entries=33 op=nft_register_rule pid=4407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:24.916145 kernel: audit: type=1325 audit(1719906924.897:1277): table=filter:113 family=2 entries=33 op=nft_register_rule pid=4407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:24.897000 audit[4407]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffc8e104e30 a2=0 a3=7ffc8e104e1c items=0 ppid=2287 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.950181 kernel: audit: type=1300 audit(1719906924.897:1277): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffc8e104e30 a2=0 a3=7ffc8e104e1c items=0 ppid=2287 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:24.970098 kernel: audit: type=1327 audit(1719906924.897:1277): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:24.923000 audit[4407]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:24.984318 kubelet[2103]: E0702 07:55:24.984277 2103 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:55:24.984654 kubelet[2103]: E0702 07:55:24.984636 2103 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ca67f849-3618-4b94-a40b-16b786f73d04-calico-apiserver-certs podName:ca67f849-3618-4b94-a40b-16b786f73d04 nodeName:}" failed. No retries permitted until 2024-07-02 07:55:25.48459734 +0000 UTC m=+97.868292822 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ca67f849-3618-4b94-a40b-16b786f73d04-calico-apiserver-certs") pod "calico-apiserver-78f595bc45-8g9nk" (UID: "ca67f849-3618-4b94-a40b-16b786f73d04") : secret "calico-apiserver-certs" not found Jul 2 07:55:24.991091 kernel: audit: type=1325 audit(1719906924.923:1278): table=nat:114 family=2 entries=20 op=nft_register_rule pid=4407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:24.923000 audit[4407]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc8e104e30 a2=0 a3=0 items=0 ppid=2287 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.027104 kernel: audit: type=1300 audit(1719906924.923:1278): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc8e104e30 a2=0 a3=0 items=0 ppid=2287 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:24.923000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:25.057100 kernel: audit: type=1327 audit(1719906924.923:1278): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:25.060000 audit[4410]: NETFILTER_CFG table=filter:115 family=2 entries=34 op=nft_register_rule pid=4410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:25.079823 kernel: audit: type=1325 audit(1719906925.060:1279): table=filter:115 family=2 entries=34 op=nft_register_rule pid=4410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:25.060000 audit[4410]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffea6cdc900 a2=0 a3=7ffea6cdc8ec items=0 ppid=2287 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:25.080000 audit[4410]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:25.080000 audit[4410]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffea6cdc900 a2=0 a3=0 items=0 ppid=2287 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:25.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:25.742027 env[1220]: time="2024-07-02T07:55:25.741976196Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f595bc45-8g9nk,Uid:ca67f849-3618-4b94-a40b-16b786f73d04,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:55:25.920051 systemd-networkd[1021]: cali97f3fc434c4: Link UP Jul 2 07:55:25.932135 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:55:25.932273 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali97f3fc434c4: link becomes ready Jul 2 07:55:25.939355 systemd-networkd[1021]: cali97f3fc434c4: Gained carrier Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.813 [INFO][4412] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0 calico-apiserver-78f595bc45- calico-apiserver ca67f849-3618-4b94-a40b-16b786f73d04 1058 0 2024-07-02 07:55:24 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78f595bc45 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal calico-apiserver-78f595bc45-8g9nk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali97f3fc434c4 [] []}} ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Namespace="calico-apiserver" Pod="calico-apiserver-78f595bc45-8g9nk" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.813 [INFO][4412] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Namespace="calico-apiserver" Pod="calico-apiserver-78f595bc45-8g9nk" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.854 [INFO][4423] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" HandleID="k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.864 [INFO][4423] ipam_plugin.go 264: Auto assigning IP ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" HandleID="k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e7e90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", "pod":"calico-apiserver-78f595bc45-8g9nk", "timestamp":"2024-07-02 07:55:25.854935026 +0000 UTC"}, Hostname:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.864 [INFO][4423] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.865 [INFO][4423] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.865 [INFO][4423] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal' Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.866 [INFO][4423] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.874 [INFO][4423] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.880 [INFO][4423] ipam.go 489: Trying affinity for 192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.886 [INFO][4423] ipam.go 155: Attempting to load block cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.895 [INFO][4423] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.192/26 host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.895 [INFO][4423] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.192/26 handle="k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.898 [INFO][4423] ipam.go 1685: Creating new handle: k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144 Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.903 [INFO][4423] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.192/26 handle="k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.914 [INFO][4423] ipam.go 1216: Successfully claimed IPs: [192.168.98.197/26] block=192.168.98.192/26 handle="k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.914 [INFO][4423] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.197/26] handle="k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" host="ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal" Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.914 [INFO][4423] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:55:25.963617 env[1220]: 2024-07-02 07:55:25.914 [INFO][4423] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.98.197/26] IPv6=[] ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" HandleID="k8s-pod-network.89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Workload="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" Jul 2 07:55:25.964865 env[1220]: 2024-07-02 07:55:25.916 [INFO][4412] k8s.go 386: Populated endpoint ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Namespace="calico-apiserver" Pod="calico-apiserver-78f595bc45-8g9nk" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0", GenerateName:"calico-apiserver-78f595bc45-", Namespace:"calico-apiserver", SelfLink:"", UID:"ca67f849-3618-4b94-a40b-16b786f73d04", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f595bc45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-78f595bc45-8g9nk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.98.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali97f3fc434c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:25.964865 env[1220]: 2024-07-02 07:55:25.916 [INFO][4412] k8s.go 387: Calico CNI using IPs: [192.168.98.197/32] ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Namespace="calico-apiserver" Pod="calico-apiserver-78f595bc45-8g9nk" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" Jul 2 07:55:25.964865 env[1220]: 2024-07-02 07:55:25.916 [INFO][4412] dataplane_linux.go 68: Setting the host side veth name to cali97f3fc434c4 ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Namespace="calico-apiserver" Pod="calico-apiserver-78f595bc45-8g9nk" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" Jul 2 07:55:25.964865 env[1220]: 2024-07-02 07:55:25.940 [INFO][4412] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Namespace="calico-apiserver" Pod="calico-apiserver-78f595bc45-8g9nk" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" Jul 2 07:55:25.964865 env[1220]: 2024-07-02 07:55:25.941 [INFO][4412] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Namespace="calico-apiserver" Pod="calico-apiserver-78f595bc45-8g9nk" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0", GenerateName:"calico-apiserver-78f595bc45-", Namespace:"calico-apiserver", SelfLink:"", UID:"ca67f849-3618-4b94-a40b-16b786f73d04", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f595bc45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-7dee0955ca060f43ad26.c.flatcar-212911.internal", ContainerID:"89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144", Pod:"calico-apiserver-78f595bc45-8g9nk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.98.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali97f3fc434c4", MAC:"f2:f8:3f:ab:a9:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:55:25.964865 env[1220]: 2024-07-02 07:55:25.960 [INFO][4412] k8s.go 500: Wrote updated endpoint to datastore ContainerID="89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144" Namespace="calico-apiserver" Pod="calico-apiserver-78f595bc45-8g9nk" WorkloadEndpoint="ci--3510--3--5--7dee0955ca060f43ad26.c.flatcar--212911.internal-k8s-calico--apiserver--78f595bc45--8g9nk-eth0" Jul 2 07:55:26.015209 env[1220]: time="2024-07-02T07:55:26.013542406Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:26.015511 env[1220]: time="2024-07-02T07:55:26.015456814Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:26.015684 env[1220]: time="2024-07-02T07:55:26.015647932Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:26.016045 env[1220]: time="2024-07-02T07:55:26.015990937Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144 pid=4448 runtime=io.containerd.runc.v2 Jul 2 07:55:26.071027 systemd[1]: Started cri-containerd-89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144.scope. Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.167000 audit: BPF prog-id=183 op=LOAD Jul 2 07:55:26.168000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.168000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4448 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:26.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839656565373362393864313837386261636431623836616434666231 Jul 2 07:55:26.169000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.169000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4448 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:26.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839656565373362393864313837386261636431623836616434666231 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.170000 audit: BPF prog-id=184 op=LOAD Jul 2 07:55:26.170000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ce380 items=0 ppid=4448 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:26.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839656565373362393864313837386261636431623836616434666231 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.171000 audit: BPF prog-id=185 op=LOAD Jul 2 07:55:26.171000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ce3c8 items=0 ppid=4448 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:26.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839656565373362393864313837386261636431623836616434666231 Jul 2 07:55:26.172000 audit: BPF prog-id=185 op=UNLOAD Jul 2 07:55:26.174000 audit: BPF prog-id=184 op=UNLOAD Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:26.174000 audit: BPF prog-id=186 op=LOAD Jul 2 07:55:26.174000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ce7d8 items=0 ppid=4448 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:26.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839656565373362393864313837386261636431623836616434666231 Jul 2 07:55:26.201000 audit[4478]: NETFILTER_CFG table=filter:117 family=2 entries=55 op=nft_register_chain pid=4478 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:55:26.201000 audit[4478]: SYSCALL arch=c000003e syscall=46 success=yes exit=27464 a0=3 a1=7ffffbfd2490 a2=0 a3=7ffffbfd247c items=0 ppid=3138 pid=4478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:26.201000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:55:26.254901 env[1220]: time="2024-07-02T07:55:26.254846611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f595bc45-8g9nk,Uid:ca67f849-3618-4b94-a40b-16b786f73d04,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144\"" Jul 2 07:55:26.259671 env[1220]: time="2024-07-02T07:55:26.259622782Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:55:27.039281 systemd-networkd[1021]: cali97f3fc434c4: Gained IPv6LL Jul 2 07:55:28.512112 env[1220]: time="2024-07-02T07:55:28.512030721Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:28.515355 env[1220]: time="2024-07-02T07:55:28.515301075Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:28.517845 env[1220]: time="2024-07-02T07:55:28.517799185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:28.520158 env[1220]: time="2024-07-02T07:55:28.520119694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:28.520937 env[1220]: time="2024-07-02T07:55:28.520884831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:55:28.525800 env[1220]: time="2024-07-02T07:55:28.525745005Z" level=info msg="CreateContainer within sandbox \"89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:55:28.546867 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3031001878.mount: Deactivated successfully. Jul 2 07:55:28.554219 env[1220]: time="2024-07-02T07:55:28.554159467Z" level=info msg="CreateContainer within sandbox \"89eee73b98d1878bacd1b86ad4fb1b73bb05561a806f42e8420cb6b7abba9144\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d6fc9ada47b1533aeea5d82a02a614c128478e28b9e4cf94f69c4360fa7128d4\"" Jul 2 07:55:28.557014 env[1220]: time="2024-07-02T07:55:28.556966673Z" level=info msg="StartContainer for \"d6fc9ada47b1533aeea5d82a02a614c128478e28b9e4cf94f69c4360fa7128d4\"" Jul 2 07:55:28.599969 systemd[1]: Started cri-containerd-d6fc9ada47b1533aeea5d82a02a614c128478e28b9e4cf94f69c4360fa7128d4.scope. Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.619000 audit: BPF prog-id=187 op=LOAD Jul 2 07:55:28.621000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.621000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4448 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666339616461343762313533336165656135643832613032613631 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4448 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666339616461343762313533336165656135643832613032613631 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.622000 audit: BPF prog-id=188 op=LOAD Jul 2 07:55:28.622000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003a9000 items=0 ppid=4448 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666339616461343762313533336165656135643832613032613631 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.624000 audit: BPF prog-id=189 op=LOAD Jul 2 07:55:28.624000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003a9048 items=0 ppid=4448 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666339616461343762313533336165656135643832613032613631 Jul 2 07:55:28.625000 audit: BPF prog-id=189 op=UNLOAD Jul 2 07:55:28.625000 audit: BPF prog-id=188 op=UNLOAD Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:28.625000 audit: BPF prog-id=190 op=LOAD Jul 2 07:55:28.625000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003a9458 items=0 ppid=4448 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:28.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666339616461343762313533336165656135643832613032613631 Jul 2 07:55:28.673276 env[1220]: time="2024-07-02T07:55:28.673231481Z" level=info msg="StartContainer for \"d6fc9ada47b1533aeea5d82a02a614c128478e28b9e4cf94f69c4360fa7128d4\" returns successfully" Jul 2 07:55:29.405100 kubelet[2103]: I0702 07:55:29.405049 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-78f595bc45-8g9nk" podStartSLOduration=3.142659133 podStartE2EDuration="5.404991948s" podCreationTimestamp="2024-07-02 07:55:24 +0000 UTC" firstStartedPulling="2024-07-02 07:55:26.258941798 +0000 UTC m=+98.642637253" lastFinishedPulling="2024-07-02 07:55:28.521274606 +0000 UTC m=+100.904970068" observedRunningTime="2024-07-02 07:55:29.403043237 +0000 UTC m=+101.786738724" watchObservedRunningTime="2024-07-02 07:55:29.404991948 +0000 UTC m=+101.788687427" Jul 2 07:55:29.427000 audit[4544]: NETFILTER_CFG table=filter:118 family=2 entries=34 op=nft_register_rule pid=4544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:29.427000 audit[4544]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fffde55cbf0 a2=0 a3=7fffde55cbdc items=0 ppid=2287 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:29.432000 audit[4544]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:29.432000 audit[4544]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffde55cbf0 a2=0 a3=0 items=0 ppid=2287 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:29.544058 systemd[1]: run-containerd-runc-k8s.io-3defe04cf3a6fc22d741474653b7f2de41072d3efbd9d2525125fc1f725d920b-runc.Jp9oRl.mount: Deactivated successfully. Jul 2 07:55:29.590142 kernel: kauditd_printk_skb: 128 callbacks suppressed Jul 2 07:55:29.590271 kernel: audit: type=1130 audit(1719906929.558:1320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.53:22-147.75.109.163:55014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:29.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.53:22-147.75.109.163:55014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:29.559728 systemd[1]: Started sshd@20-10.128.0.53:22-147.75.109.163:55014.service. Jul 2 07:55:29.815000 audit[4504]: AVC avc: denied { watch } for pid=4504 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_55_25.17965282/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c474 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c427,c474 tclass=file permissive=0 Jul 2 07:55:29.847155 kernel: audit: type=1400 audit(1719906929.815:1321): avc: denied { watch } for pid=4504 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_55_25.17965282/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c474 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c427,c474 tclass=file permissive=0 Jul 2 07:55:29.815000 audit[4504]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006ae700 a2=fc6 a3=0 items=0 ppid=4448 pid=4504 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c474 key=(null) Jul 2 07:55:29.883142 kernel: audit: type=1300 audit(1719906929.815:1321): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006ae700 a2=fc6 a3=0 items=0 ppid=4448 pid=4504 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c474 key=(null) Jul 2 07:55:29.883288 kernel: audit: type=1327 audit(1719906929.815:1321): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:55:29.815000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:55:29.926503 sshd[4546]: Accepted publickey for core from 147.75.109.163 port 55014 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:29.957302 kernel: audit: type=1101 audit(1719906929.925:1322): pid=4546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.925000 audit[4546]: USER_ACCT pid=4546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.928726 sshd[4546]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:29.926000 audit[4546]: CRED_ACQ pid=4546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.976059 systemd-logind[1228]: New session 21 of user core. Jul 2 07:55:29.977220 systemd[1]: Started session-21.scope. Jul 2 07:55:30.002367 kernel: audit: type=1103 audit(1719906929.926:1323): pid=4546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:30.002637 kernel: audit: type=1006 audit(1719906929.926:1324): pid=4546 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jul 2 07:55:30.002695 kernel: audit: type=1300 audit(1719906929.926:1324): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1729770 a2=3 a3=0 items=0 ppid=1 pid=4546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.926000 audit[4546]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1729770 a2=3 a3=0 items=0 ppid=1 pid=4546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:29.926000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:29.989000 audit[4546]: USER_START pid=4546 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:30.073436 kernel: audit: type=1327 audit(1719906929.926:1324): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:30.073579 kernel: audit: type=1105 audit(1719906929.989:1325): pid=4546 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:29.994000 audit[4549]: CRED_ACQ pid=4549 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:30.249489 sshd[4546]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:30.251000 audit[4546]: USER_END pid=4546 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:30.251000 audit[4546]: CRED_DISP pid=4546 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:30.255393 systemd[1]: sshd@20-10.128.0.53:22-147.75.109.163:55014.service: Deactivated successfully. Jul 2 07:55:30.256634 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 07:55:30.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.53:22-147.75.109.163:55014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.257915 systemd-logind[1228]: Session 21 logged out. Waiting for processes to exit. Jul 2 07:55:30.259254 systemd-logind[1228]: Removed session 21. Jul 2 07:55:30.446000 audit[4559]: NETFILTER_CFG table=filter:120 family=2 entries=33 op=nft_register_rule pid=4559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:30.446000 audit[4559]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe7fa0ab10 a2=0 a3=7ffe7fa0aafc items=0 ppid=2287 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:30.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:30.448000 audit[4559]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=4559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:30.448000 audit[4559]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe7fa0ab10 a2=0 a3=0 items=0 ppid=2287 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:30.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:30.472000 audit[4561]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=4561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:30.472000 audit[4561]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff0e28f2c0 a2=0 a3=7fff0e28f2ac items=0 ppid=2287 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:30.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:30.475000 audit[4561]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=4561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:30.475000 audit[4561]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff0e28f2c0 a2=0 a3=7fff0e28f2ac items=0 ppid=2287 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:30.475000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:32.465000 audit[4566]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=4566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:32.465000 audit[4566]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcdc25cc30 a2=0 a3=7ffcdc25cc1c items=0 ppid=2287 pid=4566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:32.467000 audit[4566]: NETFILTER_CFG table=nat:125 family=2 entries=54 op=nft_register_rule pid=4566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:32.467000 audit[4566]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffcdc25cc30 a2=0 a3=7ffcdc25cc1c items=0 ppid=2287 pid=4566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:32.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:35.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.53:22-147.75.109.163:33074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.296165 systemd[1]: Started sshd@21-10.128.0.53:22-147.75.109.163:33074.service. Jul 2 07:55:35.326597 kernel: kauditd_printk_skb: 22 callbacks suppressed Jul 2 07:55:35.326766 kernel: audit: type=1130 audit(1719906935.295:1336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.53:22-147.75.109.163:33074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.594000 audit[4575]: USER_ACCT pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.625288 kernel: audit: type=1101 audit(1719906935.594:1337): pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.625413 sshd[4575]: Accepted publickey for core from 147.75.109.163 port 33074 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:35.626269 sshd[4575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:35.624000 audit[4575]: CRED_ACQ pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.639338 systemd[1]: Started session-22.scope. Jul 2 07:55:35.653142 kernel: audit: type=1103 audit(1719906935.624:1338): pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.641013 systemd-logind[1228]: New session 22 of user core. Jul 2 07:55:35.624000 audit[4575]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9f015f30 a2=3 a3=0 items=0 ppid=1 pid=4575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.699039 kernel: audit: type=1006 audit(1719906935.624:1339): pid=4575 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 07:55:35.699249 kernel: audit: type=1300 audit(1719906935.624:1339): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9f015f30 a2=3 a3=0 items=0 ppid=1 pid=4575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.699302 kernel: audit: type=1327 audit(1719906935.624:1339): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:35.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:35.648000 audit[4575]: USER_START pid=4575 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.741377 kernel: audit: type=1105 audit(1719906935.648:1340): pid=4575 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.745113 kernel: audit: type=1103 audit(1719906935.653:1341): pid=4577 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.653000 audit[4577]: CRED_ACQ pid=4577 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.903184 sshd[4575]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:35.904000 audit[4575]: USER_END pid=4575 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.911555 systemd[1]: sshd@21-10.128.0.53:22-147.75.109.163:33074.service: Deactivated successfully. Jul 2 07:55:35.912693 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 07:55:35.914648 systemd-logind[1228]: Session 22 logged out. Waiting for processes to exit. Jul 2 07:55:35.916351 systemd-logind[1228]: Removed session 22. Jul 2 07:55:35.942118 kernel: audit: type=1106 audit(1719906935.904:1342): pid=4575 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.942254 kernel: audit: type=1104 audit(1719906935.904:1343): pid=4575 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.904000 audit[4575]: CRED_DISP pid=4575 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:35.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.53:22-147.75.109.163:33074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.017000 audit[4587]: NETFILTER_CFG table=filter:126 family=2 entries=8 op=nft_register_rule pid=4587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:36.017000 audit[4587]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffebf55c280 a2=0 a3=7ffebf55c26c items=0 ppid=2287 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:36.021000 audit[4587]: NETFILTER_CFG table=nat:127 family=2 entries=58 op=nft_register_chain pid=4587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:36.021000 audit[4587]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffebf55c280 a2=0 a3=7ffebf55c26c items=0 ppid=2287 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:40.505720 systemd[1]: run-containerd-runc-k8s.io-07f79dd1950a1416b45ea7620d13767b42ed35f535b06cded7d03328a4bc943b-runc.4W2rTT.mount: Deactivated successfully. Jul 2 07:55:40.952576 systemd[1]: Started sshd@22-10.128.0.53:22-147.75.109.163:33084.service. Jul 2 07:55:40.971873 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 07:55:40.972688 kernel: audit: type=1130 audit(1719906940.952:1347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.53:22-147.75.109.163:33084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:40.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.53:22-147.75.109.163:33084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:41.252000 audit[4611]: USER_ACCT pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.283792 sshd[4611]: Accepted publickey for core from 147.75.109.163 port 33084 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:41.284238 kernel: audit: type=1101 audit(1719906941.252:1348): pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.284743 sshd[4611]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:41.283000 audit[4611]: CRED_ACQ pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.292844 systemd[1]: Started session-23.scope. Jul 2 07:55:41.294503 systemd-logind[1228]: New session 23 of user core. Jul 2 07:55:41.321520 kernel: audit: type=1103 audit(1719906941.283:1349): pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.321655 kernel: audit: type=1006 audit(1719906941.283:1350): pid=4611 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 07:55:41.283000 audit[4611]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda0fd8bf0 a2=3 a3=0 items=0 ppid=1 pid=4611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:41.359961 kernel: audit: type=1300 audit(1719906941.283:1350): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda0fd8bf0 a2=3 a3=0 items=0 ppid=1 pid=4611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:41.283000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:41.299000 audit[4611]: USER_START pid=4611 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.402402 kernel: audit: type=1327 audit(1719906941.283:1350): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:41.402546 kernel: audit: type=1105 audit(1719906941.299:1351): pid=4611 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.299000 audit[4613]: CRED_ACQ pid=4613 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.426844 kernel: audit: type=1103 audit(1719906941.299:1352): pid=4613 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.602910 sshd[4611]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:41.603000 audit[4611]: USER_END pid=4611 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.608363 systemd-logind[1228]: Session 23 logged out. Waiting for processes to exit. Jul 2 07:55:41.610442 systemd[1]: sshd@22-10.128.0.53:22-147.75.109.163:33084.service: Deactivated successfully. Jul 2 07:55:41.611520 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 07:55:41.614049 systemd-logind[1228]: Removed session 23. Jul 2 07:55:41.604000 audit[4611]: CRED_DISP pid=4611 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.661819 kernel: audit: type=1106 audit(1719906941.603:1353): pid=4611 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.661968 kernel: audit: type=1104 audit(1719906941.604:1354): pid=4611 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:41.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.53:22-147.75.109.163:33084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:43.024000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:43.024000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:43.024000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000775300 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:43.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:43.024000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001552fc0 a2=fc6 a3=0 items=0 ppid=1829 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c457 key=(null) Jul 2 07:55:43.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:55:44.188000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8246 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.188000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00b6f4960 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:55:44.188000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:44.211000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.211000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00f2f0980 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:55:44.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:44.212000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.212000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00b6f49f0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:55:44.212000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:44.218000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.218000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00b6f4ab0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:55:44.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:44.354000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.354000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00b593bc0 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:55:44.354000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:44.356000 audit[1988]: AVC avc: denied { watch } for pid=1988 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:55:44.356000 audit[1988]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ff34400 a2=fc6 a3=0 items=0 ppid=1820 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c1015 key=(null) Jul 2 07:55:44.356000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:55:46.651047 systemd[1]: Started sshd@23-10.128.0.53:22-147.75.109.163:41318.service. Jul 2 07:55:46.682501 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 2 07:55:46.682603 kernel: audit: type=1130 audit(1719906946.650:1364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.53:22-147.75.109.163:41318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:46.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.53:22-147.75.109.163:41318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:46.949000 audit[4631]: USER_ACCT pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:46.956517 sshd[4631]: Accepted publickey for core from 147.75.109.163 port 41318 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:55:46.981719 kernel: audit: type=1101 audit(1719906946.949:1365): pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:46.981565 sshd[4631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:46.979000 audit[4631]: CRED_ACQ pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.006695 systemd[1]: Started session-24.scope. Jul 2 07:55:47.008696 systemd-logind[1228]: New session 24 of user core. Jul 2 07:55:47.010489 kernel: audit: type=1103 audit(1719906946.979:1366): pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.027093 kernel: audit: type=1006 audit(1719906946.979:1367): pid=4631 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 07:55:47.027211 kernel: audit: type=1300 audit(1719906946.979:1367): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7fa1b70 a2=3 a3=0 items=0 ppid=1 pid=4631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:46.979000 audit[4631]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7fa1b70 a2=3 a3=0 items=0 ppid=1 pid=4631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:46.979000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:47.060107 kernel: audit: type=1327 audit(1719906946.979:1367): proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:47.020000 audit[4631]: USER_START pid=4631 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.097924 kernel: audit: type=1105 audit(1719906947.020:1368): pid=4631 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.098103 kernel: audit: type=1103 audit(1719906947.023:1369): pid=4634 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.023000 audit[4634]: CRED_ACQ pid=4634 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.308724 sshd[4631]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:47.310000 audit[4631]: USER_END pid=4631 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.310000 audit[4631]: CRED_DISP pid=4631 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.348406 systemd[1]: sshd@23-10.128.0.53:22-147.75.109.163:41318.service: Deactivated successfully. Jul 2 07:55:47.349562 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 07:55:47.352392 systemd-logind[1228]: Session 24 logged out. Waiting for processes to exit. Jul 2 07:55:47.353991 systemd-logind[1228]: Removed session 24. Jul 2 07:55:47.369176 kernel: audit: type=1106 audit(1719906947.310:1370): pid=4631 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.369339 kernel: audit: type=1104 audit(1719906947.310:1371): pid=4631 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.53:22-147.75.109.163:41318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'